SlideShare une entreprise Scribd logo
1  sur  75
What do our children get up to online? [and how to cope with that]
It’s a brave new world out there
We need to understand ,[object Object],[object Object],[object Object]
THE NEW LANDSCAPE
DIGITAL NATIVES NETWORKS SPEED
In the “real” world …
Immigrants arrive
 
With little understanding of native cultures and tongues (often if not always)
 
Their children become “scouts”
 
“ They add bangers and mash and fish and chips to sag gosht and parathas, not noticing the joins” [  Ziauddin   Sardar   ]
 
The same is true of the ‘digital’ world
If you were born before 1980, you’re a digital immigrant (however smart your mobile phone is)
If not, you’re a digital native [developed world]
 
Problem 1 :  You will never be as fluent as your kids
Problem 2: Your children don’t see the on/offline divide
DIGITAL NATIVES NETWORKS SPEED
Family communications used to be ‘decentralised’
Now, they’re distributed.  Communication is Peer to Peer.
Problem 3: You have little control over how or with whom children communicate
DIGITAL NATIVES NETWORKS SPEED
More bad news (sorry)
The tools children use are changing quickly, continually and globally
Problem 4: there’s no catching up
WHAT CHILDREN DO ONLINE
Here’s a small set of popular tools that your children might play with
 
Trying to understand all of them is a mug’s game
Broad brush categories + Core principles = Begin to understand threats
3 broad brush categories Connections Content Co-creation
CONNECTIONS   CONTENT  CO-CREATION
There are 2 types of connection: immediate and over time
Immediate connections
Can be 1 to 1 (like a phone call)
Can be 1 to many (like a group chat)
Can be done in lots of ways (phone, IM, Skype, Yahoo, Google, chat rooms, jargoncity, confusetheparents.com)
All share some basic  grammar
IDENTITY PRESENCE OPENNESS
Point 1 : Presence whenever you’re online, you can see who else is online
Point 2 : Openness anyone can connect to you, but you can listen to or ignore anyone you like
Point 3 : Identity When everyone can wear a mask,  trust becomes critical
Connections over time
Social Networks Last.fm ,  Bebo ,  Facebook
Shaping their “country” ,[object Object]
Point 4 : Trails As you move round online, you leave trails, and you personalise these.
Point 5 : Communities Online communities are quick to set up & quick to join
Point 6 : Trust Trust is found through network proximity & friend of a friend approaches [FOAF].
CONNECTIONS   CONTENT  CO-CREATION
 
Walt Disney “ripped, mixed, and burnt” the Brothers Grimm
What’s new? ,[object Object],[object Object],[object Object],[object Object]
Point 7 : Creativity Natives have more ways of making and publishing more than ever before.  Not all of it ‘legal’
CONNECTIONS  CONTENT   CO-CREATION
Think Playstation or Gamecube. Think vapid expressions.
Think again.
Second Life ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
Comedians have done gigs in Second Life
People have become real world millionaires selling virtual real estate
Point 8 : Virtual is dead Online and offline are so intertwined for natives that the distinction is basically not there.
HOW TO KEEP THEM SAFE
3 possible approaches (and just like the real world none, sadly, are guaranteed)
Total Lockdown   Stop your children from communicating online.
Filter   build  some prevention measure  into the software you use
Trust   build some prevention measures into the software  and  focus on the parent-child bond
Possible approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Piers Young http://www.monkeymagic.net

Contenu connexe

Tendances

Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Bex Lewis
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
The world at your fingertips mindmap
The world at your fingertips mindmapThe world at your fingertips mindmap
The world at your fingertips mindmapWei Xiang Ong
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interactionhsudduth
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
The Light and Dark of the Internet
The Light and Dark of the InternetThe Light and Dark of the Internet
The Light and Dark of the InternetMichael Coghlan
 
Media Literacy and Personal Identity
Media Literacy and Personal IdentityMedia Literacy and Personal Identity
Media Literacy and Personal IdentityJamie Cohen
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
What is digital citizenship and its components
What is digital citizenship and its componentsWhat is digital citizenship and its components
What is digital citizenship and its componentsRolandLeonillo1
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
How technology has changed the way we communicate
How technology has changed the way we communicateHow technology has changed the way we communicate
How technology has changed the way we communicateCRISTINA DOMENE BEVIÁ
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital LiteracyShSgh4
 
J. Social Interaction in 10 years
J. Social Interaction in 10 yearsJ. Social Interaction in 10 years
J. Social Interaction in 10 yearsTanvigarg89
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpointPatrick706
 

Tendances (20)

Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
 
Power point 2 p
Power point 2 pPower point 2 p
Power point 2 p
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Technology and troop morale slide
Technology and troop morale slideTechnology and troop morale slide
Technology and troop morale slide
 
The world at your fingertips mindmap
The world at your fingertips mindmapThe world at your fingertips mindmap
The world at your fingertips mindmap
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interaction
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
The Light and Dark of the Internet
The Light and Dark of the InternetThe Light and Dark of the Internet
The Light and Dark of the Internet
 
Media Literacy and Personal Identity
Media Literacy and Personal IdentityMedia Literacy and Personal Identity
Media Literacy and Personal Identity
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
What is digital citizenship and its components
What is digital citizenship and its componentsWhat is digital citizenship and its components
What is digital citizenship and its components
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
How technology has changed the way we communicate
How technology has changed the way we communicateHow technology has changed the way we communicate
How technology has changed the way we communicate
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
J. Social Interaction in 10 years
J. Social Interaction in 10 yearsJ. Social Interaction in 10 years
J. Social Interaction in 10 years
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpoint
 

En vedette

Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Schoolbox
 
Digital Literacy by Simon Power
Digital Literacy by Simon PowerDigital Literacy by Simon Power
Digital Literacy by Simon PowerSimon Power
 
Myth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital NativeMyth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital NativeUser Intelligence
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"r71navy
 
Digital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online worldDigital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online worldDeborah Lupton
 
Digital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsDigital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsFabiano Ramos
 
Digital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prenskyDigital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prenskyanagabic
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentationavarry
 
Food and-beverage-service-management
Food and-beverage-service-managementFood and-beverage-service-management
Food and-beverage-service-managementAMARESH JHA
 

En vedette (13)

Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Literacy by Simon Power
Digital Literacy by Simon PowerDigital Literacy by Simon Power
Digital Literacy by Simon Power
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Myth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital NativeMyth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital Native
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"
 
Digital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online worldDigital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online world
 
Digital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsDigital Natives, Digital Immigrants
Digital Natives, Digital Immigrants
 
Digital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prenskyDigital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prensky
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
 
Food and-beverage-service-management
Food and-beverage-service-managementFood and-beverage-service-management
Food and-beverage-service-management
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à Understanding What Children Do Online and How to Help Them Stay Safe

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Playing safe
Playing safePlaying safe
Playing safehutchison
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-daviesStevecd
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptxShinyaMochizuki
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKermit Agbas
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
What is a global digital
What is a global digital What is a global digital
What is a global digital judesplace
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital PlaygroundKim Cofino
 

Similaire à Understanding What Children Do Online and How to Help Them Stay Safe (20)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Playing safe
Playing safePlaying safe
Playing safe
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-davies
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptx
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
What is a global digital
What is a global digital What is a global digital
What is a global digital
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Dernier

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Understanding What Children Do Online and How to Help Them Stay Safe