SlideShare a Scribd company logo
1 of 53
Managing Technology in the Home
Our kids are teaching us technology!
Do you think an adult
could be addicted to a
phone or social media
APP?
Question…
Do you think a CHILD
could be addicted to a
phone or social media
APP?
Question…
Current Statistics
• The AVERAGE teen spends about 4 hours a day online
• 25% have met up in person somebody they met online
• 30% of teens have cheated on a test with a phone
• 35% have hacked into a friends social media account or email
• 40% have accessed pornography online
• 75% admit to hiding their online behavior from parents
• 30% of kids have parental controls on their computers
Key Terms
Filtering
programs that BLOCK content
specifically, adult content
Monitoring
programs the
record computer
and cell phone
activities
What in the world
are my kids doing
online?
Current trends in
Tech!
Social networking parents =
Social networking for kids…
Rules for social media use…
• Know the platform
• Know the password
• Know their friends / followers
INTERNET SAFETY RISKS
Rules for social media use…
• Always use privacy settings
• Post respectfully - positively
• No Bullying!
• Select photos carefully
INTERNET SAFETY RISKS
Current Trend: Fan Following
• Collect followers and likes
• Instagram is the #1
• Kids can get obsessed with these!
Pornography
• 1 in 9 websites
online are
pornographic
• Put a filter
program on ANY
computer that your
child will use.
Pornography
• The average child stumbles onto a
pornographic website by age 12.
• The first time a child sees pornography
online it is most often accidental and
potentially devastating.
• A private location vs. public location is the
difference between a one time accident and
a new found routine or habit.
Pornography
• Family Computer
• Laptop
• Cell phone
• iPad / Tablet
• Game console
• Friends house
• Put a filter program on ANY device that your
child will use, especially when they are
young.
Anonymous Apps
Secret
Whisper
YikYak
Sober
Cyber Bullying
Cyber Bullying
Rebecca Ann Sedwick
12 Years old.
Died from suicide
Cyber Bullying
Danger! Beware!
Completely Anonymous
Cyber Bullying
Sexting
Definition…
Sending of sexually explicit photos
or text through one’s mobile phone
to friends or suitors.
Sexting
Feb, 2016
Oct, 2014
10,000 images
Mostly 13-17 year olds
Over 1000 videos
Posted and reposted to 10
sites in less than 24 hours
Hook up Apps
Tinder, Blendr, Grindr, Skout, and
Swoon
We are the first
generation of
parents that
have had to deal
with the new
phenomenon!
Colleges and
employers are
looking!
How do I keep my kids
safe from the ever
changing world of
technology!?!
Virus – Malware - Phishing
The most common problem
Location….Location….Location…
Cell phones at night…
Scott’s low
cost budget
version…..
The iBasket
Cell phones at night…
Contracts!
• Cell phone contract
• www.iccguru.com/cellphonecontract.doc
Passwords
Google and YouTube
• Google’s “Safe Search”
Google and YouTube
• YouTube’s “Safety Mode”
www.safesearchkids.com
www.kiddle.co
WebFilter
Web Filter for Mac and PC
Monitoring for the computer
• Email
• Instant Messaging
• Keystrokes
• Screenshots
• Website history
• Searches
• Facebook
• YouTube
SetupiOSrestrictions
SAFEONLINE
TO KEEP YOUR FAMILY
iPhone – iPad – iTouch CONTROL
iPhone – iPad – iTouch CONTROL
CellPhonelocation
TextMessageMonitoring
Scott’s Final Tips
1) Don't get left behind! LEARN
2) Know the PW's of your kid's accounts
3) Remove technology at night
4) Talk about consequences of social
media
5) Put a filter on all internet devices
6) Consider some monitoring software
Connect with your KIDS
Internet Safety for Parents

More Related Content

What's hot

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technologyBrad McAllister
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents lisluandaprimary
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?TeenSafe
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenTeenSafe
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshareTeenSafe
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeenSafe
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensTeenSafe
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Scott Burnett
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Tamasine Preece
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Brochure
BrochureBrochure
Brochurejrj6819
 

What's hot (19)

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Brochure
BrochureBrochure
Brochure
 

Similar to Internet Safety for Parents

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Scott Burnett
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Scott Burnett
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetydanriles
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 

Similar to Internet Safety for Parents (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 

More from Scott Burnett

2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptxScott Burnett
 
Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettScott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsScott Burnett
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen TimeScott Burnett
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017Scott Burnett
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationScott Burnett
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Scott Burnett
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Scott Burnett
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldScott Burnett
 

More from Scott Burnett (10)

2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
 
Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Internet Safety for Parents