Presentation of the activities of the Multimedia Labs in the MEDINS project (immaterial cultural heritage) at the Malta technical meeting in November 2007
There is much discussion about social media tactics, strategy, and ROI. However there is little talk about operations. This deck touches on staffing, business processes, technology, measurement and decision making. Slides 5-11 were inspired by Ben Parr's http://bit.ly/41AcAD
Presentation of the activities of the Multimedia Labs in the MEDINS project (immaterial cultural heritage) at the Malta technical meeting in November 2007
There is much discussion about social media tactics, strategy, and ROI. However there is little talk about operations. This deck touches on staffing, business processes, technology, measurement and decision making. Slides 5-11 were inspired by Ben Parr's http://bit.ly/41AcAD
Leveraging AWS for your business provides a catalyst for security programs as customers inherit a faster pace of security innovation simply by using AWS. This session highlights design and architecture patterns customers can employ to measurably improve the security of their organization. In this session, customers explore design patterns for data security using encryption, strong access controls, and least privilege; for implementing detective security controls, such as logging and monitoring, at scale; and for implementing a defense-in-depth network security architecture.
Finding Simple - Seat Map Design for Everyone UX Australia 2014Jason Bayly
Finding simple is the journey of how Eventbrite reimagined the reserved seating event space giving event organisers the power to design and assign tickets visually to seat maps of their own making. Reserved seating events allow event organizers to optimise revenue with tiered ticket pricing whilst providing attendees with a better event experience through selecting their own seat at the time of purchase. Reserved seating solutions until now were expensive, hard to use, visually uninspired and simply out of reach for many event organizers.
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Jeremy Fuksa
As responsive design and progressive enhancement become mainstream design practices, the decades old approach of using Adobe Photoshop to comp up page designs for clients is becoming increasingly irrelevant. A quick search online shows designers quickly clamoring for a better way to do their work.
Along with new tools to learn, there’s also the challenge of acclimating a client base that has been used to seeing fully-rendered Photoshop designs for decades. How do these new practices benefit them?
This presentation looks at some “post-Photoshop” design practices and how they might fit into a designer’s workflow. Additionally, Jeremy will share how a new design workflow has worked for his team at Clickfarm and how clients have received this new way of looking at their projects.
This presentation is an overview of multi-touch technology available for developers today, and it covers different scenarios of multi-touch and when to use which one.
Musings on the changing character of Britain's cultural landscape. It is a plea to the retail shed builders to look at themselves and begin to respect their potential customers. It is a warning to the potential customers of ASP-Host and Web Solutions. It is a plea to the Law Society to put the upholding of the law at the top of their agenda rather than the protection of their cartel. The presentation is amusing yet serious. If you like it, spread the word and pass it on. Thanks.
Twucwuc land is a new acronym for scamland. WULs have been around for a while. Fast-buck Britain and Buckfast Britain are the same place. An invoice reminder should be an invoice reminder and should never be post-dated. Take care on your journey.
Migrations of existing enterprise applications to the cloud can be complex. There are no migration methodologies or magic bullets that enable a simple lift and shift or automated migration. Typical migration projects take a great deal of discovery work, re-architecture, and refactoring. In this session, we will share known challenges and considerations that must be accounted for when designing, planning, and executing a migration. Topics will include: scale-out and distributed architectures, geographic dispersion, leveraging existing cloud services, and logging & monitoring. In addition, this session will address how in-depth discovery efforts can be paired with configuration management, automation, and source control to minimize the risk of future technical debt. Finally, we’ll cover the business and technical factors the affect the complexity of application refactoring.
Leveraging AWS for your business provides a catalyst for security programs as customers inherit a faster pace of security innovation simply by using AWS. This session highlights design and architecture patterns customers can employ to measurably improve the security of their organization. In this session, customers explore design patterns for data security using encryption, strong access controls, and least privilege; for implementing detective security controls, such as logging and monitoring, at scale; and for implementing a defense-in-depth network security architecture.
Finding Simple - Seat Map Design for Everyone UX Australia 2014Jason Bayly
Finding simple is the journey of how Eventbrite reimagined the reserved seating event space giving event organisers the power to design and assign tickets visually to seat maps of their own making. Reserved seating events allow event organizers to optimise revenue with tiered ticket pricing whilst providing attendees with a better event experience through selecting their own seat at the time of purchase. Reserved seating solutions until now were expensive, hard to use, visually uninspired and simply out of reach for many event organizers.
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Jeremy Fuksa
As responsive design and progressive enhancement become mainstream design practices, the decades old approach of using Adobe Photoshop to comp up page designs for clients is becoming increasingly irrelevant. A quick search online shows designers quickly clamoring for a better way to do their work.
Along with new tools to learn, there’s also the challenge of acclimating a client base that has been used to seeing fully-rendered Photoshop designs for decades. How do these new practices benefit them?
This presentation looks at some “post-Photoshop” design practices and how they might fit into a designer’s workflow. Additionally, Jeremy will share how a new design workflow has worked for his team at Clickfarm and how clients have received this new way of looking at their projects.
This presentation is an overview of multi-touch technology available for developers today, and it covers different scenarios of multi-touch and when to use which one.
Musings on the changing character of Britain's cultural landscape. It is a plea to the retail shed builders to look at themselves and begin to respect their potential customers. It is a warning to the potential customers of ASP-Host and Web Solutions. It is a plea to the Law Society to put the upholding of the law at the top of their agenda rather than the protection of their cartel. The presentation is amusing yet serious. If you like it, spread the word and pass it on. Thanks.
Twucwuc land is a new acronym for scamland. WULs have been around for a while. Fast-buck Britain and Buckfast Britain are the same place. An invoice reminder should be an invoice reminder and should never be post-dated. Take care on your journey.
Migrations of existing enterprise applications to the cloud can be complex. There are no migration methodologies or magic bullets that enable a simple lift and shift or automated migration. Typical migration projects take a great deal of discovery work, re-architecture, and refactoring. In this session, we will share known challenges and considerations that must be accounted for when designing, planning, and executing a migration. Topics will include: scale-out and distributed architectures, geographic dispersion, leveraging existing cloud services, and logging & monitoring. In addition, this session will address how in-depth discovery efforts can be paired with configuration management, automation, and source control to minimize the risk of future technical debt. Finally, we’ll cover the business and technical factors the affect the complexity of application refactoring.