SlideShare a Scribd company logo
1 of 78
Download to read offline
#FCCCTECH @adriennebryant
• Law of Motion (Two feet)
• Mobile device use is encouraged
• Take care of your own needs
• Disagreements are valued and important
• We invite and welcome your feedback
Borrowed from Velvet Chainsaw Consulting/Jeff Hurt
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
#FCCCTECH @adriennebryant
•
•
•
•
Photo Credit Luke Wroblewski
Photo Credit CITE Conference
Photo Credit Maureen Flynn-Burhoe
#FCCCTECH @adriennebryant
•
•
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
Photo Credit Alec Couros
#FCCCTECH @adriennebryant
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
• Prezi
• Haiku Deck
• Emaze
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
AB
#FCCCTECH @adriennebryant
•
•
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
#FCCCTECH @adriennebryant
•
•
•
•
•
•
#FCCCTECH @adriennebryant
Virtual Sharing & Collaboration
Collaboration Tools
• Evernote
• Google Apps for Business
• Trello
• Basecamp
• Asana
• Dropbox
Personal Teleconferencing
Screen Sharing
• Join.Me
• FreeScreenSharing
• Google Hangouts
Scheduling
• Doodle
• Calendly
• Volunteer Spot
• Schedule Once
• Signup Genius
Sharing Content
Presentations
• Prezi
• Haiku Deck
• Emaze
#FCCCTECH @adriennebryant
Screen Capture
• Screenshot Captor (Windows)
• Skitch (Mac)
• Jing (Windows/Mac)
• Snagit (Windows/Mac)
Screen Recording
• Camtasia
• Cam Studio
• Screenr
• Screenflow
Social Media
• Hootsuite
• Buffer
• Tweetdeck
• Twibbon
• Bit.ly
Publishing
• Wordpress
• SquareSpace
• Slideshare
• Animoto
WorkFlow
• IFTTT
• Zapier
• WappWolf
Infographics
• Piktochart
• Easel.ly
• Infogr.am
#FCCCTECH @adriennebryant
•
•
•
•
•
•
•
•
•
•
Adrienne Bryant, CAE
Member Information & Database Manager
Association of Florida Colleges
abryant@myafchome.org
(850) 222-3222
@adriennebryant

More Related Content

Viewers also liked

Infographic - the conversation that is almost happening
Infographic - the conversation that is almost happeningInfographic - the conversation that is almost happening
Infographic - the conversation that is almost happening
David Morrison
 
Presentation nina
Presentation ninaPresentation nina
Presentation nina
14061993
 
курсов проект по компютърни технологии в рекламата и медийните комуникаци
курсов проект по компютърни технологии в рекламата и медийните комуникацикурсов проект по компютърни технологии в рекламата и медийните комуникаци
курсов проект по компютърни технологии в рекламата и медийните комуникаци
joyVM
 
The Art of China
The Art of ChinaThe Art of China
The Art of China
Greg A.
 
Romanesque art
Romanesque artRomanesque art
Romanesque art
Greg A.
 
อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์
natchaboonphithukkij
 
Makalah ict
Makalah ictMakalah ict
Makalah ict
14061993
 
The Art of India 2
The Art of India 2The Art of India 2
The Art of India 2
Greg A.
 
The Baroque
The BaroqueThe Baroque
The Baroque
Greg A.
 
Art of China
Art of ChinaArt of China
Art of China
Greg A.
 

Viewers also liked (20)

The Digital Meeting Professional
The Digital Meeting ProfessionalThe Digital Meeting Professional
The Digital Meeting Professional
 
Tech Tips to Boost Office Productivity
Tech Tips to Boost Office ProductivityTech Tips to Boost Office Productivity
Tech Tips to Boost Office Productivity
 
English ISP presentation: The orenda
English ISP presentation: The orenda English ISP presentation: The orenda
English ISP presentation: The orenda
 
Infographic - the conversation that is almost happening
Infographic - the conversation that is almost happeningInfographic - the conversation that is almost happening
Infographic - the conversation that is almost happening
 
Presentation nina
Presentation ninaPresentation nina
Presentation nina
 
Cyber Security White Paper
Cyber Security White PaperCyber Security White Paper
Cyber Security White Paper
 
Art of China 2
Art of China 2Art of China 2
Art of China 2
 
курсов проект по компютърни технологии в рекламата и медийните комуникаци
курсов проект по компютърни технологии в рекламата и медийните комуникацикурсов проект по компютърни технологии в рекламата и медийните комуникаци
курсов проект по компютърни технологии в рекламата и медийните комуникаци
 
The Art of China
The Art of ChinaThe Art of China
The Art of China
 
Romanesque art
Romanesque artRomanesque art
Romanesque art
 
อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์
 
ณัชชาŒ
ณัชชาŒณัชชาŒ
ณัชชาŒ
 
Makalah ict
Makalah ictMakalah ict
Makalah ict
 
Pk uk 2
Pk uk 2Pk uk 2
Pk uk 2
 
Art of China 3
Art of China 3Art of China 3
Art of China 3
 
Greek art
Greek artGreek art
Greek art
 
The Art of India 2
The Art of India 2The Art of India 2
The Art of India 2
 
The Baroque
The BaroqueThe Baroque
The Baroque
 
Art of China
Art of ChinaArt of China
Art of China
 
Art of Japan 2
Art of Japan 2Art of Japan 2
Art of Japan 2
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

The Digital Professional