SlideShare una empresa de Scribd logo
1 de 41
H&F online youth culture The role of Internet in blurring the line between fun and hate
Online aggression according to children, parents and teachers Focus-groups and online surveys
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
H&F Culture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
A hint from psychology of humor… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is benign wrongdoing? ,[object Object],[object Object],[object Object],[object Object]
In the context of cyber-bullying and  e-aggression… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phase I: Focus groups ,[object Object],[object Object],[object Object],[object Object]
Focus-groups summary results ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phase II: Online surveys ,[object Object],[object Object],[object Object],[object Object],[object Object]
Surveys methodology ,[object Object],[object Object],[object Object],[object Object]
My online experience Participants : 2 13 Children
Age
Gender
Have you ever been offended, embarrassed or humiliated by someone online ?
In most cases the perpetrator was ....
In most cases the perpetrator wanted ...
When for fun, it happens via (multiple answers):
When for real, it happens via (multiple answers):
Have you ever offended, embarrassed, or humiliated someone online?
In most cases I attacked ....
I most cases I wanted ...
When for real, it happens via (more than one answer allowed) :
When for fun, it happens via (multiple answers) :
My child in Internet Participants: 33 Parents
As far as you are aware, has your child been offended, embarrassed or  humiliated by someone online?
In most cases the perpetrator was…
In most cases the perpetrator wanted…
It happens via  ( multiple answers ):
My pupils in Internet Participants: 1033 Teachers
Are you aware of cases when a pupil has been offended, embarrassed, or humiliated by someone online?
In most cases the perpetrator was…
In most cases the perpetrator wanted…
It happens via  ( multiple answers ):
Conclusions I  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions II  ,[object Object],[object Object],[object Object]
Alarmed or relieved? ,[object Object],[object Object],[object Object],[object Object]
Implications for interventions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One example of intervention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy PaperSeneca Washburn
 
The modern day bully
The modern day bully The modern day bully
The modern day bully meganct
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
Social Media and Children
Social Media and ChildrenSocial Media and Children
Social Media and ChildrenAdeKoh123
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parentingbermandry
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyinghmfowler
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School StudentsYour College Concierge
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Is censorship a good or a bad idea
Is censorship a good or a bad ideaIs censorship a good or a bad idea
Is censorship a good or a bad ideaJonah Adshead
 

La actualidad más candente (20)

Inormation Literacy Paper
Inormation Literacy PaperInormation Literacy Paper
Inormation Literacy Paper
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Internet social
Internet socialInternet social
Internet social
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Social Media and Children
Social Media and ChildrenSocial Media and Children
Social Media and Children
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Kiane Mari Romero
Kiane Mari RomeroKiane Mari Romero
Kiane Mari Romero
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Is censorship a good or a bad idea
Is censorship a good or a bad ideaIs censorship a good or a bad idea
Is censorship a good or a bad idea
 

Destacado (10)

Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
Space and Cyber: Roles and Issues in Deterrence
Space and Cyber: Roles and Issues in DeterrenceSpace and Cyber: Roles and Issues in Deterrence
Space and Cyber: Roles and Issues in Deterrence
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
What’s In Cyberspace
What’s  In  CyberspaceWhat’s  In  Cyberspace
What’s In Cyberspace
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar a Web experienceENG

Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxchristiandean12115
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxalanrgibson41217
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...VSE 2016
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptxliutommy1
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingthelinesgarza05
 
Cyberbullying class 97
Cyberbullying class 97Cyberbullying class 97
Cyberbullying class 97herbison
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCrisAnnChattoII
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
'They had pictures of me'
'They had pictures of me''They had pictures of me'
'They had pictures of me'APLEORG
 

Similar a Web experienceENG (20)

Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docxIs Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
Is Cyberbullying a Serious Cause of Suicide in Students and Shou.docx
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
CyberBullying.pptx
CyberBullying.pptxCyberBullying.pptx
CyberBullying.pptx
 
6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline6 8-unit3-cyberbullyingcrossingtheline
6 8-unit3-cyberbullyingcrossingtheline
 
Cyberbullying class 97
Cyberbullying class 97Cyberbullying class 97
Cyberbullying class 97
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Skype lesson
Skype lessonSkype lesson
Skype lesson
 
CYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptxCYBER-BULLYING FINAL PRESENTATION.pptx
CYBER-BULLYING FINAL PRESENTATION.pptx
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
'They had pictures of me'
'They had pictures of me''They had pictures of me'
'They had pictures of me'
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
CS_Cyberbullying.pptx
CS_Cyberbullying.pptxCS_Cyberbullying.pptx
CS_Cyberbullying.pptx
 
CS_Cyberbullying.pptx
CS_Cyberbullying.pptxCS_Cyberbullying.pptx
CS_Cyberbullying.pptx
 
C2. Cyberbullying
C2. CyberbullyingC2. Cyberbullying
C2. Cyberbullying
 

Más de Georgi Apostolov

Презентация за урок за онлайн-тормоз
Презентация за урок за онлайн-тормозПрезентация за урок за онлайн-тормоз
Презентация за урок за онлайн-тормозGeorgi Apostolov
 
Мотивация и иновации
Мотивация и иновацииМотивация и иновации
Мотивация и иновацииGeorgi Apostolov
 
Заедно за по добър интернет
Заедно за по добър интернетЗаедно за по добър интернет
Заедно за по добър интернетGeorgi Apostolov
 
Презентация за Деня за безопасен интернет 2014 г. на Борислава Динева
Презентация за Деня за безопасен интернет 2014 г. на Борислава ДиневаПрезентация за Деня за безопасен интернет 2014 г. на Борислава Динева
Презентация за Деня за безопасен интернет 2014 г. на Борислава ДиневаGeorgi Apostolov
 
Онлайн рискове за деца и противодействие
Онлайн рискове за деца и противодействиеОнлайн рискове за деца и противодействие
Онлайн рискове за деца и противодействиеGeorgi Apostolov
 
Онлайн рискове за деца и превенция
Онлайн рискове за деца и превенцияОнлайн рискове за деца и превенция
Онлайн рискове за деца и превенцияGeorgi Apostolov
 
Рискове за деца онлайн и методи за превенция
Рискове за деца онлайн и методи за превенцияРискове за деца онлайн и методи за превенция
Рискове за деца онлайн и методи за превенцияGeorgi Apostolov
 
Рисковете в интернет
Рисковете в интернетРисковете в интернет
Рисковете в интернетGeorgi Apostolov
 
Център за безопасен интернет
Център за безопасен интернетЦентър за безопасен интернет
Център за безопасен интернетGeorgi Apostolov
 
Презентация за работа с ученици
Презентация за работа с ученициПрезентация за работа с ученици
Презентация за работа с ученициGeorgi Apostolov
 
Кои са реалните рискове за деца онлайн
Кои са реалните рискове за деца онлайнКои са реалните рискове за деца онлайн
Кои са реалните рискове за деца онлайнGeorgi Apostolov
 
Real virtual violence methodology
Real virtual violence methodologyReal virtual violence methodology
Real virtual violence methodologyGeorgi Apostolov
 
Интернет рискове за деца
Интернет рискове за децаИнтернет рискове за деца
Интернет рискове за децаGeorgi Apostolov
 
Интернет - митове и факти
Интернет - митове и фактиИнтернет - митове и факти
Интернет - митове и фактиGeorgi Apostolov
 

Más de Georgi Apostolov (18)

Презентация за урок за онлайн-тормоз
Презентация за урок за онлайн-тормозПрезентация за урок за онлайн-тормоз
Презентация за урок за онлайн-тормоз
 
Мотивация и иновации
Мотивация и иновацииМотивация и иновации
Мотивация и иновации
 
Заедно за по добър интернет
Заедно за по добър интернетЗаедно за по добър интернет
Заедно за по добър интернет
 
Презентация за Деня за безопасен интернет 2014 г. на Борислава Динева
Презентация за Деня за безопасен интернет 2014 г. на Борислава ДиневаПрезентация за Деня за безопасен интернет 2014 г. на Борислава Динева
Презентация за Деня за безопасен интернет 2014 г. на Борислава Динева
 
Онлайн рискове за деца и противодействие
Онлайн рискове за деца и противодействиеОнлайн рискове за деца и противодействие
Онлайн рискове за деца и противодействие
 
Ruse traffick-2
Ruse traffick-2Ruse traffick-2
Ruse traffick-2
 
Онлайн рискове за деца и превенция
Онлайн рискове за деца и превенцияОнлайн рискове за деца и превенция
Онлайн рискове за деца и превенция
 
Рискове за деца онлайн и методи за превенция
Рискове за деца онлайн и методи за превенцияРискове за деца онлайн и методи за превенция
Рискове за деца онлайн и методи за превенция
 
Рисковете в интернет
Рисковете в интернетРисковете в интернет
Рисковете в интернет
 
Център за безопасен интернет
Център за безопасен интернетЦентър за безопасен интернет
Център за безопасен интернет
 
Презентация за работа с ученици
Презентация за работа с ученициПрезентация за работа с ученици
Презентация за работа с ученици
 
Кои са реалните рискове за деца онлайн
Кои са реалните рискове за деца онлайнКои са реалните рискове за деца онлайн
Кои са реалните рискове за деца онлайн
 
Real virtual violence methodology
Real virtual violence methodologyReal virtual violence methodology
Real virtual violence methodology
 
Интернет рискове за деца
Интернет рискове за децаИнтернет рискове за деца
Интернет рискове за деца
 
Итрай и учи
Итрай и учиИтрай и учи
Итрай и учи
 
Интернет - митове и факти
Интернет - митове и фактиИнтернет - митове и факти
Интернет - митове и факти
 
LarryMagid
LarryMagidLarryMagid
LarryMagid
 
Web experienceBG
Web experienceBGWeb experienceBG
Web experienceBG
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Web experienceENG