This document summarizes trends in social networking and applications from December 2009. It discusses the power of social networks and how search has become primary. It also examines prosumers who both produce and consume media, and how the technographics of social media vary by age. Key concepts covered include the reverse sales funnel, social objects, transaction costs, collaboration and communication networks, and the opportunities of digital ecosystems for organizations.
IBM Belgium Assistants Day. Presenting Assistants how to use Social Media for themselves or in name of their manager. Also discussed the thin line between always available in Social Media and private life
Zeno India 2013 Trends: Convergence Compassjohnkerrnz
Timed to celebrate the advent of the Year of the Snake and for the fourth year in a row, welcome to 'Zenology 2013: The Convergence Compass.' Launched with a two-day roadshow in India (Delhi and Mumbai), this deck steps out:
- Key Consumer Trend affecting marketing and engagement
- Implication for communications and marketing professionals
- Best Practice Approach and goes deeper into a local market example
The Five Key Consumer Insights Are:
1. Simpler Lives
2. National and Cultural Pride
3. All About Me
4. Karmic Brands
5. e2Commerce
If you'd like more information, or are interested in a point-of-view for your specific country, please do not hesitate to contact john.kerr@zenogroup.com.
Outlook 2010 new features review. Email-to-SMS solutions. Have I drowned my laptop? Insurers take a sideways look at Facebook. De-crapify your PC. Q&A: How to write our online handbook? Clicks of the Trade - Banish browser mixed-content security warnings
We live in a digital world bombarded by emails, tweets, blogs, pop-ups, banners, billboards, television ads and radio shout outs - each one of them screaming for our attention. It is a new era of mass communication and social engagement where your customers connect, comment, post, check-in, share and discuss everything in realtime...including your brand. Welcome to the Engagement Era....it's time to
Adapt, Evolve and Engage.
IBM Belgium Assistants Day. Presenting Assistants how to use Social Media for themselves or in name of their manager. Also discussed the thin line between always available in Social Media and private life
Zeno India 2013 Trends: Convergence Compassjohnkerrnz
Timed to celebrate the advent of the Year of the Snake and for the fourth year in a row, welcome to 'Zenology 2013: The Convergence Compass.' Launched with a two-day roadshow in India (Delhi and Mumbai), this deck steps out:
- Key Consumer Trend affecting marketing and engagement
- Implication for communications and marketing professionals
- Best Practice Approach and goes deeper into a local market example
The Five Key Consumer Insights Are:
1. Simpler Lives
2. National and Cultural Pride
3. All About Me
4. Karmic Brands
5. e2Commerce
If you'd like more information, or are interested in a point-of-view for your specific country, please do not hesitate to contact john.kerr@zenogroup.com.
Outlook 2010 new features review. Email-to-SMS solutions. Have I drowned my laptop? Insurers take a sideways look at Facebook. De-crapify your PC. Q&A: How to write our online handbook? Clicks of the Trade - Banish browser mixed-content security warnings
We live in a digital world bombarded by emails, tweets, blogs, pop-ups, banners, billboards, television ads and radio shout outs - each one of them screaming for our attention. It is a new era of mass communication and social engagement where your customers connect, comment, post, check-in, share and discuss everything in realtime...including your brand. Welcome to the Engagement Era....it's time to
Adapt, Evolve and Engage.
The University of Texas Energy Poll is a comprehensive study of consumer attitudes and behaviors regarding energy development, innovation and consumption in the United States. This presentation highlights major findings of the first poll, which will be repeated every six months. The poll is conducted under the supervision of the Energy Management and Innovation Center at McCombs School of Business. Professor Wayne Hoyer is the poll director.
How Businesses Use Web 2.0 and Social Media. Presentation by Charlie Kreitzberg and Anne Pauker Kreitzberg, Cognetics at CIO Summit, April 2009, Valley Forge, PA. www.cognetics.com
The introduction slides to the CPD Programme entitled 'Web 2.0. The Times They Are a Changing' by Jim Hamill from Strathclyde University. They present a brief overview and introduction to Web 2.0 and Social Media.
More information about this program on the page:
http://www.strath.ac.uk/business/cee/cpd/web2
David Nour on Enterprise Social Market Leadership 6.10David Nour
David Nour, author of Relationship Economics on Enterprise Social Market Leadership. Social Networking is about "presence;" Social Market Leadership is about "purpose."
This presentation was created as a thought piece for the retail-consumer electronic category in 2007. Before the mainstreaming of social media tracking, consumer reviews and social e-commerce technologies, this thinking presumed blending online and offline social media into the retail space would add utility, brand value and sales associate credibility to the retail environment.
차세대 쇼셜 네트워크 서비스에 대한 발표자료로서 2009년 2월 26일 KRnet 이다.
KRnet이란 'korea Internet Conference'로서 그 중 'Track : Convergence Promotion Services'에서 'Track : Convergence Promotion Services'의 발표자료이다. 발표제목은 'Next Social Network Service'이며 내용은 다음과 같다.
소셜네트워크 서비스란 쉽게 말해 ‘나의 프로필을 네트워크에 공유하여, 구인/구직에 실질적인 도움을 주는 웹 서비스의 일종이다. 그러나 쇼셜 네트워크란 아날로적 인맥망에서부터 시작하여 디지털 인맥망으로, 사회학에서부터 소프트웨어 개발학으로까지, 구인/구직의 연결망에서 관계의 매듭을 열어가는 연결망으로 발전 중에 있다. 본 강연은 네트워크 이론에 의한 수렴과 확산의 상호질서를 바
탕으로 소셜 서비스의 발전 과정과 그 의의를 진단한다. 특히 단문 서비스 중심의 소셜 서비스인 트위터(twitter), 이미지 기반의 소셜 서비스인 플리커(flickr), 동영상 맥락의 소셜 서비스인 유튜브(youtube), 프로필 중심의 소셜 서비스인 마이스페이스(myspace) 등이 각 매체의 허브로서 역할하며 어떻게 사회, 문화, 비즈니스적인 변화를 주는지를 소개한다. 강연을 통해 소셜 서비스의 각 허브들이 상
호작용하여 수렴되는 쇼셜 네트워크에서의 아이텐티가 어떻게 개인을 설명해주고 신뢰해주는 메커니즘을 가지는지를 분석할 예정이다. 즉 소셜 서비스란 개인과 집단의 신뢰의 증진을 위한 관계 맺기 서비스이다.
Journalism and Media Innovation - Strategy PresentationKnight Foundation
Knight Foundation's Michael Maness outlines the foundation's strategy for transforming journalism and media innovation, in a presentation at the Online News Association 2012 conference in San Francisco. Find out more at knightfoundation.org.
Social media, emerging platforms and online advertisingMarketingatBahrain
Boye Balogun - Regional Director, Head of Digital MENA; Mindshare presented Social Media, Emerging Platforms And Online Advertising at Social Media Masters Forum 2012 in Bahrain. www.socialmediamasters.me
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
44. Successful Digital Experience
Useful Useable Desirable Sustainable Social
Reason Intuitive Differentiated Maintained Conversation
Purpose Easy to use Memorable Supported Sharing
Needs Accessible Aesthetic Evolving Community
Scaling Networking
Next
Basics
level
Users, Brands, Business processes, Values etc.
Ref: Original by David Armano 2007, modified by Teemu Arina
46. DIGITALIZATION IN ORGANIZATIONS
Opportunities and sophistication
Online Digital
Email Website e-Business
Collaboration Ecosystems
Value
W
Visibility
Comm
Open In
Im
ays of W
proving
C
unication
hain Int
novation
orking
egration
47. ROLES IN THE ECOSYSTEM
Increases chances of survival by
CATALYST supporting the growth of a living
and functioning ecosystem.
Aims to own and control a large
DICTATOR portion of the ecosystem.
Extracts more value from the
MILKER ecosystem than contributes back.
Builds specialized services &
NICHE-PLAYER niche skills, which help the actor
to differentiate from others.
52. AWARENESS SYSTEMS
“...offer tremendous potential for
innovation, with a wide range of forms
and contexts for transforming the
space around us.”
– Panos Markopoulos et al. (2009)
53. COMMUNICATION CONTENT CONTEXT
<<2000 2000-2008 2008>>
3 MOBILE ERA’s
Ref: SPRXMobile
54. INFORMATION & ATTENTION
“What information consumes is rather
obvious: it consumes the attention of its
recipients. Hence a wealth of information
creates a poverty of attention.”
– Social Scientist Herbert Simon (1971)
60. TOMATOES. Teemu Arina
CEO - dicole ltd.
tarina.blogging.fi
www.dicole.com
teemu@dicole.com
MY VCARD TO YOUR PHONE:
“Imagination is more
important than knowledge.”
– Albert Einstein
tar1na