SlideShare a Scribd company logo
1 of 8
Cal Net Technology Group|Q3 Report

QUARTER 3 REPORT
JULY – SEPTEMBER 2012
PREPARED BY: talkTECH Communications, LLC
Key Data Q3
• Managed and garnered over 524 Twitter followers for @ZSchuler with a
  reach of64,683during the quarter
• Managed and garnered over 764 Twitter followers for @CalNetTechLuca
  with a reach of 71,071 during the quarter
• Managed and generated over 500 LinkedIn connections for Zack
• Drafted, posted and seeded 8 blog posts
• Garnered 3 feature media placements
• Currently drafting Roberts Container case study
• Currently drafting CNEPG news release
• Created and pitched 1 infographic (IT Security Trends & Facts)
• Drafted and pitched 1 byline article (Improvements for Windows 8 on PC –
  pending placement on IT Jungle)
• Drafted 2 news releases: over 2,885 news release views
Twitter Analytics

        @zschuler - Reach 97/01-9/25)
7000


6000


5000


4000


3000                                    count

2000


1000


   0




              Total: 64,683
Twitter Analytics

       @CalNetTechLuca - Reach (7/01-9/24)
4500

4000

3500

3000

2500

2000
                                             count
1500

1000

 500

   0




                      Total: 71,071
Marketing Collateral
Feature Placements
News Release

News Releases and Top Placements:
Cal Net Technology Group Announces Enterprise-Level Information Security
   Practice Options for SMBs CLICK HERE TO VIEW




Cal Net Technology Group Announces Company Growth With New Hires
   and Notable Awards CLICK HERE TO VIEW
Thank you!


   CONFIDENTIALITY NOTICE: This document contains confidential and privileged
    information intended only for the individual(s) or entity to which it has been
proposed. You are hereby notified that any dissemination, distribution, or copying of
                     this information is STRICTLY PROHIBITED.

More Related Content

What's hot

Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesAmazon Web Services
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
F5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing SurveyF5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing SurveyDSorensenCPR
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE - ATT&CKcon
 
Security challenges in a multi cloud environment
Security challenges in a multi cloud environmentSecurity challenges in a multi cloud environment
Security challenges in a multi cloud environmentEyal Estrin
 

What's hot (10)

Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed Rules
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
F5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing SurveyF5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing Survey
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
Security challenges in a multi cloud environment
Security challenges in a multi cloud environmentSecurity challenges in a multi cloud environment
Security challenges in a multi cloud environment
 

Viewers also liked

Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012TalkTECHcomm
 
Sonus Q4 2012 Report
Sonus Q4 2012 ReportSonus Q4 2012 Report
Sonus Q4 2012 ReportTalkTECHcomm
 
Sonus Q3 2012 Report
Sonus Q3 2012 ReportSonus Q3 2012 Report
Sonus Q3 2012 ReportTalkTECHcomm
 
Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012TalkTECHcomm
 
BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012TalkTECHcomm
 
מצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפהמצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפהחשבים פלוס
 
You zakelijke portretten vslideshare
You zakelijke portretten vslideshareYou zakelijke portretten vslideshare
You zakelijke portretten vslideshareHans Hiltermann
 
Essentials of Open Source Documentation
Essentials of Open Source DocumentationEssentials of Open Source Documentation
Essentials of Open Source DocumentationMoi Borah
 
How To Approach Partner Marketing Programs
How To Approach Partner Marketing ProgramsHow To Approach Partner Marketing Programs
How To Approach Partner Marketing ProgramsTamara Scannell
 
Tiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuhTiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuhujox
 
stereotypical teenage love story
stereotypical teenage love storystereotypical teenage love story
stereotypical teenage love storyAnya Navaratnam
 
Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016Comunicatecivi
 

Viewers also liked (20)

eBrochure_Design Services
eBrochure_Design ServiceseBrochure_Design Services
eBrochure_Design Services
 
Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012
 
Sonus Q4 2012 Report
Sonus Q4 2012 ReportSonus Q4 2012 Report
Sonus Q4 2012 Report
 
Sonus Q3 2012 Report
Sonus Q3 2012 ReportSonus Q3 2012 Report
Sonus Q3 2012 Report
 
Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012
 
BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012
 
Photo album
Photo albumPhoto album
Photo album
 
Hospital software
Hospital softwareHospital software
Hospital software
 
מצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפהמצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפה
 
Los simpsons y futurama
Los simpsons y futuramaLos simpsons y futurama
Los simpsons y futurama
 
You zakelijke portretten vslideshare
You zakelijke portretten vslideshareYou zakelijke portretten vslideshare
You zakelijke portretten vslideshare
 
Essentials of Open Source Documentation
Essentials of Open Source DocumentationEssentials of Open Source Documentation
Essentials of Open Source Documentation
 
How To Approach Partner Marketing Programs
How To Approach Partner Marketing ProgramsHow To Approach Partner Marketing Programs
How To Approach Partner Marketing Programs
 
מצגת חשבי שכר-Slide
מצגת חשבי שכר-Slideמצגת חשבי שכר-Slide
מצגת חשבי שכר-Slide
 
Tiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuhTiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuh
 
stereotypical teenage love story
stereotypical teenage love storystereotypical teenage love story
stereotypical teenage love story
 
Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016
 
Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...
 
Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...
 
Agricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak MallawaarachchiAgricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak Mallawaarachchi
 

Similar to CNT Q3 2012 Report

William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
 
Enabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service AnalyticsEnabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service AnalyticsPrecisely
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Andreas M. Oswald
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 
M&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINALM&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINALTamerlan Aliev
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Lilminow
 
The Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple SourcesThe Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple SourcesInside Analysis
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentationJaime Cajigas ☁
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timePol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timeQuadrant Communications
 
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...DataStax
 
Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A Paula Wang
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective: njain_seanet
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Michael Brito | Zeno Group
 

Similar to CNT Q3 2012 Report (20)

William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
Enabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service AnalyticsEnabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service Analytics
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
M&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINALM&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINAL
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
The Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple SourcesThe Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple Sources
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timePol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and time
 
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
 
Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective:
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

CNT Q3 2012 Report

  • 1. Cal Net Technology Group|Q3 Report QUARTER 3 REPORT JULY – SEPTEMBER 2012 PREPARED BY: talkTECH Communications, LLC
  • 2. Key Data Q3 • Managed and garnered over 524 Twitter followers for @ZSchuler with a reach of64,683during the quarter • Managed and garnered over 764 Twitter followers for @CalNetTechLuca with a reach of 71,071 during the quarter • Managed and generated over 500 LinkedIn connections for Zack • Drafted, posted and seeded 8 blog posts • Garnered 3 feature media placements • Currently drafting Roberts Container case study • Currently drafting CNEPG news release • Created and pitched 1 infographic (IT Security Trends & Facts) • Drafted and pitched 1 byline article (Improvements for Windows 8 on PC – pending placement on IT Jungle) • Drafted 2 news releases: over 2,885 news release views
  • 3. Twitter Analytics @zschuler - Reach 97/01-9/25) 7000 6000 5000 4000 3000 count 2000 1000 0 Total: 64,683
  • 4. Twitter Analytics @CalNetTechLuca - Reach (7/01-9/24) 4500 4000 3500 3000 2500 2000 count 1500 1000 500 0 Total: 71,071
  • 7. News Release News Releases and Top Placements: Cal Net Technology Group Announces Enterprise-Level Information Security Practice Options for SMBs CLICK HERE TO VIEW Cal Net Technology Group Announces Company Growth With New Hires and Notable Awards CLICK HERE TO VIEW
  • 8. Thank you! CONFIDENTIALITY NOTICE: This document contains confidential and privileged information intended only for the individual(s) or entity to which it has been proposed. You are hereby notified that any dissemination, distribution, or copying of this information is STRICTLY PROHIBITED.