Sunday, March 12, 2017

Core Netiquette For Children And Young Adults Via Netiquette IQ 3/13/17


The following is an excerpt from my book, "Netiquette IQ . . ." If you wish to understand some of the elements which contribute negatively to our children's and young adults communication, this is a great advanced summation. For a closer look at the book, follow the links below

          Our technological powers increase, but the side effects and potential hazards also escalate.

—Alvin Toffler

Epolicy for children

        One of the most sensitive segments of epolicy and Netiquette is the area of children’s usage of email and the Internet. These are some of the major categories to consider:

  1. Rules
  2. Bullying
  3. Safety
  4. Courtesy
  5. Education
  6. Emergency aid and assistance

Application of Netiquette, good habits, and correct grammar are essential routines throughout life. Negative patterns can easily end up being used in school and social life into adulthood. No one will dispute the absolute need to have protection for children using email and the Internet. The same principles apply to texting, social groups, and other popular online activities. However, there are other considerations that have both short-term and long-term ramifications.

        Young people are now increasingly using electronic communication in lieu of face-to-face, written, or telephone contact. Arguably, children and young adults who have begun their methods of communications via email, Twitter, and texting have decreased knowledge of basic formal writing skills and Netiquette. Unfortunately, these habits and behavior translate into not only the items mentioned above but also may also promote behavior that allows for and facilitates lack of respect, abundance of informality, and the inability to understand the measure one’s words have on others.


        The premiere consideration when children and young people access the Internet, email, texting, or Twitter is safety. In order to maximize this, it is critical to educate and provide a list and processes for young users. These rules offer a good comprehensive starting point to provide for young people that considers their point of view:

1.   Never use communicative technology when biking, driving, crossing busy streets, or in hazardous situations.
2.   Always ask your parents’ permission before using your full name, address, telephone number, or school name anywhere on the Internet.
3.   Always tell your parents or guardian if you see something online that you know is wrong or that makes you feel uncomfortable.
4.   Don’t respond to messages that make you feel uncomfortable or uneasy.
5.   Never give out a credit card number or password online.
6.   Never send out your picture without your parents’ permission.
7.   Be careful when someone offers you something, such as gifts or money, for nothing.
8.   Don’t ever accept a gift or an offer that involves having someone visit your house.
9.   Never arrange to meet someone in person whom you’ve met online, unless you discuss it with your parents and an adult goes with you.
10.    Talk to your parents to set up rules for going online. Decide with them the best time of day to be online, the length of time to be online, and appropriate areas to visit.
11.  Get to know your “online friends” just as you get to know all of your other friends. Be sure that you are dealing with someone whom you and your parents know and trust before giving out any personal information about yourself via email.
12.  Be respectful.
13.  Avoid electronic bullying.
14.  Do not open attachments from senders you do not know.
15.  Do not deploy spyware or any other malicious or compromising programs or software.
16.  Do not use other people’s email accounts.
17.  Report email abuses.
18.  Educate your friends when you see they do not follow these guidelines.
19.  Minimize webspeak , i.e., short words, emoticons or slang.
20.  Do not use foul[language (i.e., no swearing).
21.  Do not criticize people who might read your message later. Any mail can be forwarded or inadvertently sent.
22.  Remember: whatever you write will be stored somewhere forever.
23.  Avoid “flaming” or insulting someone.
24.  Tell others to stop when they use foul language.
25.  log off immediately when done.
26.  Do not be afraid to ask a trusted adult for guidance.

Tabula Rosa Systems presents solutions for your toughest network challenges: (609) 818-1802

Gigamon Visibility for AWS

With the rapid evolution of the public cloud that brings instant advantages of economies of scale, elasticity and agility, IT and data center administrators are re-evaluating their investments to deploy or scale applications on-premise.  They either deploy new applications in the public cloud or use the public cloud for additional needs to augment the on-premise private cloud.  In either case, what enterprises end up with is a hybrid cloud environment.  Other enterprises start in the cloud with no physical data center footprint, commonly referred to as a born-in-the-cloud model.  Unlike SaaS environments, in which application ownership and security of information is the responsibility of the SaaS provider, an Infrastructure-as-a-Service (IaaS), or public cloud environment, places the responsibility of application and information security on the enterprise.
So, how does an enterprise which has migrated or deployed workloads into the public cloud manage, secure and understand its data traversing the public cloud?    

Join Tabula Rosa & Gigamon

at 10am PT / 1pm ET on March 16, 2017

to learn how the industry’s first pervasive visibility platform addresses the following challenges inherent to IaaS and public cloud deployments:

  • Inability to access traffic, and by extension, information traversing the public cloud for analysis
  • Discreet vendor monitoring agents per instance
  • Impacts workload and VPC performance
  • Increased complexity
  • Static visibility with heavy disruption

Tabula Rosa Systems

Your source for dynamic, effective and comprehensive solutions.

For almost 15 years, Tabula Rosa Systems (TRS) has brought elite IT technology products, solutions and services to our customers. New world class products for network, security and systems management are added regularly to our repertoire. Each of our products is a leader in price/performance, customer satisfaction and long-term viability. Our newsletter features product solutions based upon input from our customers.
To schedule a meeting/webex or to request a product evaluation:
Call (609) 818-1802     Visit Our Blog     Email

Netiquette IQ Logo

You're Hired Book

Test Drive the Gigamon Visibility Platform for AWS
During the test drive, you will be able to access and evaluate multiple real-world cloud use cases—within minutes. It’s a terrific way for you to experience in a tangible way the benefits of the Gigamon Visibility Platform for AWS.
There’s a large market opportunity with real challenges…
According to a recent Intel survey of 2,000 IT professionals, 93% are using some type of cloud service, with 62% moving customer data into cloud infrastructures. (And as networks expand and perimeters fade, IT administrators and security operations teams face growing challenges in managing, securing, and understanding the data traversing their public cloud infrastructure.
…And Gigamon offers a real solution
How does the Gigamon Visibility Platform for AWS solve these challenges? First, it is the industry’s first holistic view of data in motion—traversing not only AWS public clouds, but also private, virtualized, and hybrid clouds.
Second, it allows cloud operations and cloud security teams to see, manage, secure, and understand what matters within their public cloud environments.
·         Provides a consistent way to access network traffic within and across VPCs
·         Distributes traffic effectively to multiple tools
·         Customizes network traffic to specific tools using policies
·         Delivers elastic, on-demand visibility as workloads scale out
Resources to share about Gigamon Visibility Platform for AWS
Video: For more insight into Gigamon’s AWS strategy, watch this three-minute video of Gigamon Director of Product Management Sesh Sayani

Good Netiquette And A Green Internet To All!  =====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:  or 609 818 1802.
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

Anyone who would like to review the book and have it posted on my blog or website, please contact me

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.

No comments:

Post a Comment