Cyber-bullying is a growing phenomenon amongst preteens. Studies have established that nearly 43% of children are victims of cyberbullying and girls are twice as likely to be targeted. Students who experienced cyber attacks suffer drops in school grades and have more suicidal thoughts than those who had never dealt with such forms of peer aggression. A link between cyber harassment victimization and noncompletion of school has been demonstrated resulting in increased risk of poor education and substance abuse in adulthood.
Sadly, the majority of the victims do not report the incidents to adults or authorities due to fear of negative effects and social scandal. The tacit support given to the bullying perpetrators through silence contributes to the escalation of victimization. Banning technology is not the answer. Cyberbullying prevention in schools is crucial to defend students from this new face of violence.
The Internet Society Palestine Chapter is conducting a campaign to raise awareness about the dangers of electronic blackmail and cyber harassment. The project, funded by the Internet Society Beyond the Net, has already reached more than 2250 schoolgirls in 25 Palestinian schools in phase I of the project.
Ahmad Alsadeh, assistant professor at Birzeit University and Continue reading
In this episode Russ White talks about how security absolutism is actually detrimental to securing important data and systems, and how shifting our view of security to a balance of tradeoffs would be a much better approach.
The post Short Take – Security As A Tradeoff appeared first on Network Collective.
There's been a lot of hype about what 5G will bring, but we're years away from highly immersive experiences. Here's what to expect.
Steve Krause created a full-blown network services deployment solution, including post-deployment validation of OSPF and BGP routing, while attending Building Network Automation Solutions online course (I prefer course attendees working on real-life problems instead of artificial ones).
Hope you’ll enjoy exploring it ;)
Trump today said his support of ZTE came directly from a request made by Chinese President Xi.
Heptio CTO Joe Beda explained that orchestration infers a plan from the start, while Kubernetes is more about not knowing what's going to emerge.
Gee Rittenhouse says security needs to be simpler. The complexity that today's security professionals deal with is overwhelming.
From foliage that blocks antennas to bandwidth speeds that vary dramatically, global operators open up about the good, bad, and ugly of their 5G trials.
The company now counts over 5,800 Catalyst 9000 customers, up from 3,100 last quarter.
Oracle will integrate the DataScience.com cloud workspace platform for data science into its Oracle Cloud infrastructure.
Despite what some people say, automation is not for the lazy. This opinion probably comes from the fact that the whole point of automation is to reduce repetitive tasks and make your life easier. Indeed automation can do just that, as well as giving you back hours each week for other tasks.
But getting your automation off the ground to begin with can be a challenge. It’s not as if you just decide, “Hey, we’re going to automate our network now!” and then you follow a foolproof, well-defined process to implement network automation across the board. You have to make many decisions that require long discussions, and necessitate ambitious and careful thinking about how you’re going to automate.
Just as with anything else in the IT world, there are no one-size-fits-all solutions, and no “best practices” that apply to every situation. But there are some common principles and crucial decision points that do apply to all automation endeavors.
In this post, I’ll give you five network automation tips and tricks to get clarity around your automation decisions and reduce any friction that may be inhibiting (further) adoption of network automation.
Automating Continue reading