SlideShare une entreprise Scribd logo
1  sur  98
Ethics for Cyberspace:   Teaching Students Right from Wrong in the Digital Age   Invest in Futures, ISLMA  November 6, 2008 Doug Johnson www.doug-johnson.com
… a little about the presenter
Handouts
A modest proposal…
poke an eye out poke another kid
write a dirty word write a threatening note write   a note with test answers
some students may have  nicer models
get stolen
break and need repair
might be used for doodling
Federal legislation needed NOW!
Where are we going???? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not all technology comes with rules for safe and appropriate behavior.
What’s different about “computer ethics?” ,[object Object]
What is ethical behavior? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s different about “computer ethics?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethical codes ,[object Object],[object Object],[object Object],[object Object],[object Object]
The 3 P's Privacy - Property - aPpropriate use
Major areas:  Privacy , Property, aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object]
Other questions… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Major areas: Privacy,  Property , aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is time property? Online checking stocks Online planning a wedding Online booking a vacation Online buying a car Online looking for another job Online looking for a spouse Online trading Pokemon cards
Major areas: Privacy,  Property,  aPpropriate use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other questions… ,[object Object],[object Object],[object Object]
Major areas: Privacy, Property,  aPpropriate use ,[object Object]
For each scenario: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Major areas: Privacy, Property,  aPpropriate use ,[object Object]
Other questions… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What students need to understand ,[object Object],[object Object],[object Object],[object Object],[object Object]
http://www.whitehouse.gov http://www.whitehouse.com
What do teachers need to understand?
What teachers need to understand *  I clearly understand the difference between freeware, shareware, and commercial software and the fees involved in the use of each.  I know the programs for which the district or my building holds a site license.  *  I understand the school board policy on the use of copyrighted materials. *  I demonstrate ethical usage of all software and let my students know my personal stand on legal and moral issues involving technology.  *  I know and enforce the school’s technology policies and guidelines, including its Internet Acceptable Use Policy.  *  I am aware of the controversial aspects of technology use including data privacy, equitable access, and free speech issues.
Perhaps the classic case of moral confusion happened recently in California: A young teacher was fired for downloading pornography on a school computer. "When he was confronted, the guy said, 'Well, what's wrong with that? I can download anything I want from my home computer, so why not here?' " explains [Paul] Longo, who has spent most of his career analyzing teacher misbehavior. "All the sorts of things that would ring a hundred bells for most people rang no bells for this guy. It doesn't mean he's an evil person. It means that he doesn't get it. So I guess that's why there's a need for [ethics education] for teachers.“ Christian Science Monitor , November 6, 2001
What parents need to understand Training for parents at  AASL’s FamiliesConnect  URL in bibliography/link from my website
What activities  teach ethical behaviors? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do adults think of when they think of social networking?
This?
Dateline ,[object Object],[object Object],[object Object],Predators & cyberbullies: Reality check   www.blogsafety.com/  March 16, 2007 McCollam, The Shame Game Columbia Journalism Review , Jan/Feb 2007 www.cjr.org/issues/2007/1/McCollam.asp
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Where do  you live? ,[object Object]
What is Web 2.0? ,[object Object],[object Object],[object Object]
MySpace
Blogs
RSS Aggregators
Wikis
Content sharing  -  FlickR - YouTube - del.icio.us
3D Virtual Environments
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Web 1.0 to Web 2.0 safety issues ,[object Object],[object Object],[object Object]
… old fears
… from  predators
If you don’t tell your children you love them… someone online will.
… from each other www.cyberbully.org
Ad campaign material
District Guide
… from    themselves
… from themselves Stacy Snyder aka “Drunken Pirate”
… from themselves
It’s never really gone
That darned free speech thing
Common sense
The danger to kids in Web 2.0 comes not from what they may find online, but from what they themselves put online for others to access.
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Let’s just block it all! ,[object Object],[object Object],[object Object]
This  unnecessary  and  overly broad  legislation will  hinder students’ ability  to engage in distance learning and block library computer users from accessing a  wide array  of  essential  Internet  applications  including instant messaging, email, wikis and blogs. -  Leslie Burger, ALA President, 2006
Blocking formats not content. For every problem, there is a solution that is simple, neat, and wrong. H.L. Menken
Why filtering  is ineffective ,[object Object],[object Object],[object Object],[object Object],[object Object]
SchoolBoredom.com
Education is imperative ,[object Object],[object Object],[object Object],[object Object],[object Object],Due Diligence
Tracking Teresa
 
What activities  teach  ethical behaviors? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Education  can  be enhanced with the social web resources
Classroom blogs <areallydifferentplace.org>
School library blog
 
Wiki textbooks
Teen Second Life
Full participation? ,[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object],X
Making good decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Love and balance are the  two most important words in the English language. - John Wooden
Our policy – a group decision… District Technology Advisory Committee Small Important meetings Good agendas and minutes Wide representation Defined responsibilities
Due process for blocking ,[object Object],[object Object],[object Object],[object Object],[object Object]
On the agenda… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Educate adults Continuous effort Study needed
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The fleeber filter
1994 ,[object Object],[object Object],[object Object]
2008 ,[object Object],[object Object],[object Object]
2015, 2020, 2050… ,[object Object],[object Object],[object Object]
What can we as educators do to promote ethical behaviors? ,[object Object],Your ideas
Questions?
The bear
Ethics for Cyberspace:   Teaching Students Right from Wrong in the Digital Age   Doug Johnson www.doug-johnson.com

Contenu connexe

Tendances

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Larry Magid
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?Sarah Welstead
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop SlidesNathanielCarlson2
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia Smith-Davis
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Parent presentation 2010-11
Parent presentation 2010-11Parent presentation 2010-11
Parent presentation 2010-11Holly Gerla
 

Tendances (20)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior Norms Approach Beats Fear & Exaggeration for Motivating Behavior
Norms Approach Beats Fear & Exaggeration for Motivating Behavior
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides[R]evolution - Parenting Workshop Slides
[R]evolution - Parenting Workshop Slides
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop PresentationLydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
Lydia's BEaPRO Digital Literacy (Citizenship) Family Workshop Presentation
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Parent presentation 2010-11
Parent presentation 2010-11Parent presentation 2010-11
Parent presentation 2010-11
 

Similaire à Teaching Students Right from Wrong in the Digital Age

Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Webteach42
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009Emporia State University
 
Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009Emporia State University
 
Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines LoriBenoit2
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenshipcynthia.warner
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Studentsbeccapr69
 

Similaire à Teaching Students Right from Wrong in the Digital Age (20)

Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009Teaching Ethical Behavior, Kansas Conference Oct 2009
Teaching Ethical Behavior, Kansas Conference Oct 2009
 
Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009Teaching Ethical Behavior, Kasl Conference Oct 2009
Teaching Ethical Behavior, Kasl Conference Oct 2009
 
Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines Ethics Copyright and Fair Use Guidelines
Ethics Copyright and Fair Use Guidelines
 
ACRL
ACRLACRL
ACRL
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Pike Ky Digital Citizenship
Pike Ky Digital CitizenshipPike Ky Digital Citizenship
Pike Ky Digital Citizenship
 
Addressing Ethics With Young Students
Addressing Ethics With Young StudentsAddressing Ethics With Young Students
Addressing Ethics With Young Students
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Ethical
EthicalEthical
Ethical
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Teaching Students Right from Wrong in the Digital Age