This session will outline the easy practices you can implement to ensure the content you produce and the way you deliver it on social media is accessible for everyone, including disabled users.
HTTP is a protocol for transmitting hypermedia documents across the internet. It uses a client-server model where a web browser makes HTTP requests to a web server. The server then responds with the requested resources.
HTTP uses TCP/IP and the default port is 80. Requests have a method line specifying the request method (GET, POST, etc.), URL, and HTTP version. Responses have a status line with the HTTP version, status code, and reason phrase. Both include optional header lines and message body. Common methods are GET to retrieve a resource and POST to submit data to a server. Status codes indicate if a request was successful or encountered an error.
White Paper: Saml as an SSO Standard for Customer Identity ManagementGigya
SAML (Security Assertion Markup Language) is an XML standard that allows secure websites and services to exchange user authentication and authorization data to enable single sign-on (SSO). It structures user identity data to create a rich user profile that can be shared across affiliated systems. While complex to implement, SAML provides a secure standard for user authentication and authorization, especially for enterprises and consumer-facing businesses. The document discusses how SAML works, provides examples of its use cases, and considerations for whether it is suitable for a given organization's identity management needs.
Data storage security in cloud computingSonali Jain
The document discusses cloud computing and ensuring data security in cloud storage. It defines cloud computing as internet-based computing using shared resources provided on demand. It then lists advantages and disadvantages of cloud storage. The document proposes using distributed verification protocols and homomorphic tokens to ensure data integrity, error detection, and dependability while supporting dynamic operations like updates, deletes and appends. The goal is to address security threats to confidentiality, integrity and availability of data stored in the cloud.
Validate your AZ-104 Exam learning and preparation with our most updated AZ-104 dumps. Dumpspedia has experienced IT experts who gather and approve a huge range of Microsoft AZ-104 Questions Answers for Azure Administrator Associate Certification seekers. Practicing our 100% updated AZ-104 Practice Tests is a guaranteed way towards your success in Microsoft AZ-104 Exam.
https://www.dumpspedia.com/AZ-104-dumps-questions.html
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...Amazon Web Services
Discover how AWS is empowering developers to overcome challenges of the past by providing on-demand access to numerous IT resources once inaccessible. Learn about AWS's Mobile Hub, CodeStar, and Lambda, while witnessing the ways these services are increasing developer productivity and streamlining backend configuration. AWS is excited to play a role in this age of constant developer innovation.
Speaker: Stephen Liedig. Solutions Architect. Amazon Web Services
Level: 200
This document discusses security architecture in cloud computing. It provides an overview of cloud risk assessments and how they differ from traditional assessments. It also compares cloud security architectures to traditional security architectures. Finally, it outlines the key domains covered by the Cloud Security Alliance, including governance, operations, and others.
This document discusses DevOps concepts and best practices. It recommends breaking down barriers between development and operations, treating infrastructure as code, automating processes, implementing continuous integration and deployment, and monitoring systems. The key aspects are adopting a collaborative culture, implementing automation tools, and establishing practices like infrastructure as code, configuration management, and continuous integration, delivery and deployment.
This document provides an introduction and overview of DevOps concepts and practices. It discusses how DevOps seeks to resolve the core conflict between development needs to deploy new features quickly and operations needs to keep systems running stably. The document outlines some key DevOps concepts like breaking down silos between development and operations, enabling collaboration across teams, integrating tooling and automating processes to allow for faster and more reliable software releases. It also discusses how DevOps aims to better align IT capabilities with business needs like continuously delivering value to customers through software.
HTTP is a protocol for transmitting hypermedia documents across the internet. It uses a client-server model where a web browser makes HTTP requests to a web server. The server then responds with the requested resources.
HTTP uses TCP/IP and the default port is 80. Requests have a method line specifying the request method (GET, POST, etc.), URL, and HTTP version. Responses have a status line with the HTTP version, status code, and reason phrase. Both include optional header lines and message body. Common methods are GET to retrieve a resource and POST to submit data to a server. Status codes indicate if a request was successful or encountered an error.
White Paper: Saml as an SSO Standard for Customer Identity ManagementGigya
SAML (Security Assertion Markup Language) is an XML standard that allows secure websites and services to exchange user authentication and authorization data to enable single sign-on (SSO). It structures user identity data to create a rich user profile that can be shared across affiliated systems. While complex to implement, SAML provides a secure standard for user authentication and authorization, especially for enterprises and consumer-facing businesses. The document discusses how SAML works, provides examples of its use cases, and considerations for whether it is suitable for a given organization's identity management needs.
Data storage security in cloud computingSonali Jain
The document discusses cloud computing and ensuring data security in cloud storage. It defines cloud computing as internet-based computing using shared resources provided on demand. It then lists advantages and disadvantages of cloud storage. The document proposes using distributed verification protocols and homomorphic tokens to ensure data integrity, error detection, and dependability while supporting dynamic operations like updates, deletes and appends. The goal is to address security threats to confidentiality, integrity and availability of data stored in the cloud.
Validate your AZ-104 Exam learning and preparation with our most updated AZ-104 dumps. Dumpspedia has experienced IT experts who gather and approve a huge range of Microsoft AZ-104 Questions Answers for Azure Administrator Associate Certification seekers. Practicing our 100% updated AZ-104 Practice Tests is a guaranteed way towards your success in Microsoft AZ-104 Exam.
https://www.dumpspedia.com/AZ-104-dumps-questions.html
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...Amazon Web Services
Discover how AWS is empowering developers to overcome challenges of the past by providing on-demand access to numerous IT resources once inaccessible. Learn about AWS's Mobile Hub, CodeStar, and Lambda, while witnessing the ways these services are increasing developer productivity and streamlining backend configuration. AWS is excited to play a role in this age of constant developer innovation.
Speaker: Stephen Liedig. Solutions Architect. Amazon Web Services
Level: 200
This document discusses security architecture in cloud computing. It provides an overview of cloud risk assessments and how they differ from traditional assessments. It also compares cloud security architectures to traditional security architectures. Finally, it outlines the key domains covered by the Cloud Security Alliance, including governance, operations, and others.
This document discusses DevOps concepts and best practices. It recommends breaking down barriers between development and operations, treating infrastructure as code, automating processes, implementing continuous integration and deployment, and monitoring systems. The key aspects are adopting a collaborative culture, implementing automation tools, and establishing practices like infrastructure as code, configuration management, and continuous integration, delivery and deployment.
This document provides an introduction and overview of DevOps concepts and practices. It discusses how DevOps seeks to resolve the core conflict between development needs to deploy new features quickly and operations needs to keep systems running stably. The document outlines some key DevOps concepts like breaking down silos between development and operations, enabling collaboration across teams, integrating tooling and automating processes to allow for faster and more reliable software releases. It also discusses how DevOps aims to better align IT capabilities with business needs like continuously delivering value to customers through software.
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
This is based on the following publications:
Azure Strategy and Implementation Guide by Joachim Hafner, Simon Schwingel, Tyler Ayers, and Rolf Masuch. Introduction by Britt Johnston.
With reference to Enterprise Cloud Strategy, 2nd Edition by Eduardo Kassner and Barry Briggs.
All Links to resources are at the end of the presentation.
Migrating on premises workload to azure sql databasePARIKSHIT SAVJANI
This document provides an overview of migrating databases from on-premises SQL Server to Azure SQL Database Managed Instance. It discusses why companies are moving to the cloud, challenges with migration, and the tools and services available to help with assessment and migration including Data Migration Service. Key steps in the migration workflow include assessing the database and application, addressing compatibility issues, and deploying the converted schema to Managed Instance which provides high compatibility with on-premises SQL Server in a fully managed platform as a service model.
The document discusses how MuleSoft's Anypoint Platform can be used to connect applications, data, and devices across systems in order to create integrated experiences for customers. Some key points:
- The Anypoint Platform provides a single solution for API management and integration that allows organizations to connect any application, data, or device.
- It offers pre-built connectors and templates that can accelerate development times. Projects using the platform see up to 64% faster delivery and 40% increased productivity.
- When combined with Salesforce, the platform unlocks enterprise data and helps create a single customer view across systems through integrations between front and back office applications.
This document summarizes an event about Microsoft 365 Copilot hosted by Pune Tech Community. The event featured a presentation and demo of M365 Copilot by Vignesh Ganesan. Copilot is an AI assistant currently in early access that can help automate tasks across M365 apps like Word, PowerPoint, Excel, Outlook and Teams. The presentation provided an overview of Copilot's capabilities, a demo of its features, and discussed considerations for enterprises looking to pilot Copilot, including technical prerequisites, licensing costs, and developing a pilot program. Useful resources for learning more about Copilot were also shared.
Web Services Security (WS-Security) is a proposed standard that addresses securing data exchanged as part of a web service. It provides authentication, authorization, confidentiality, integrity, and non-repudiation. Security can be implemented at the transport level using SSL/TLS to secure the communication channel, or at the message level by securing the SOAP message itself using standards like XML Encryption, XML Signature, and WS-Security. Transport level security secures the connection, while message level security secures individual messages and allows security to travel with the message between applications and intermediaries.
VOWLMap: Graph-based Ontology Alignment Visualization and EditingCatia Pesquita
VOWLMap is a tool for visualizing, editing, and validating ontology alignments. It implements the Visual Notation for OWL Ontologies (VOWL). Available at: https://github.com/liseda-lab/VOWLMap
Integrating your on-premises Active Directory with Azure and Office 365nelmedia
This document provides an overview and instructions for integrating an on-premises Active Directory with Azure Active Directory and Office 365. It discusses the different identity models and options for synchronization and federation. It also provides tips and tools for setup, administration, and troubleshooting the integration. The included lab setup guides taking an existing Windows Server 2012 R2 VM, adding Active Directory, and configuring synchronization with Azure AD and user creation.
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...Sonatype
There are numerous examples of DevOps and Continuous Delivery reference architectures available, and each of them vary in levels of detail, tools highlighted, and processes followed. Yet, there is a constant theme among the tool sets: Jenkins, Maven, Sonatype Nexus, Subversion, Git, Docker, Puppet/Chef, Rundeck, ServiceNow, and Sonar seem to show up time and again.
The document provides an overview of an assessment that analyzes a company's readiness to transition to cloud computing. It outlines a survey that collects business and technical information to evaluate key gaps and make recommendations on leveraging IBM's cloud offerings. The survey addresses factors like business goals, pricing strategies, infrastructure management, and virtualization to develop a customized plan to accelerate the company's cloud transformation.
Mass Migration Strategy - A Key Step in the Enterprise Transformation - AWS C...AWS Germany
Vortrag "Mass Migration Strategy - A Key Step in the Enterprise Transformation" von Angelo Crippa beim AWS Cloud Web Day für Mittelstand und Großunternehmen. Alle Videos und Präsentationen finden Sie hier: http://amzn.to/1VUJZsT
Showcase development processes and methods with our content ready Devops PowerPoint Presentation Slide. Focus on rapid application delivery using our visually appealing development and operations PPT visuals. The operating system PowerPoint complete deck comprises self-explanatory and editable PowerPoint templates such as need for DevOps, best practices, criteria for choosing a pilot project, DevOps goals, timeline for DevOps transformation, current state future state, 30-60-90 day plan, roadmap for DevOps, transformation post successful DevOps Implementation, RACI matrix, dashboard to name a few. Users can easily customize all the templates as per their specific project needs. Furthermore, you can also use this IT operations management presentation deck to encourage your team to adopt DevOps culture practices and tools. Demonstrate DevOps goals like Increase automation and standardize the process, reduce cost effort & time to market and so on. Download our system development lifecycle PowerPoint templates to present ways to make improved products faster for greater client satisfaction. Handle deficiencies with our DevOps Powerpoint Presentation Slides. Initiate action to acquire desired assets. https://bit.ly/3y8q8NC
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)Amazon Web Services
The document discusses the 6 Rs migration strategy for identifying migration options to AWS: Retain, Retire, Rehost, Replatform, Refactor, and Rearchitect (Replace). It provides descriptions and considerations for each option. It also discusses Scholastic's use of various migration strategies like Retain, Rehost/Replatform, Rearchitect, and Refactor for different applications. The document emphasizes using an assessment-based approach and mapping business drivers to the appropriate migration strategy.
The document discusses how to implement site reliability engineering (SRE) practices without having an SRE on the team. It recommends starting with setting service level indicators (SLIs) and service level objectives (SLOs), establishing rules for how the system should function and an incident response process, and always performing postmortems after incidents to document failures and fixes. The document also provides some best practices for code deployment, managing on-call responsibilities, and finding automation opportunities. Useful resources for learning more about SRE are also listed.
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It authenticates over 1 trillion times since release and manages identity data for over 5 million organizations, including 86% of Fortune 500 companies using Microsoft Cloud services. Azure AD provides single sign-on, multi-factor authentication, and application access management across devices and platforms.
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...Splunk
With the acceleration of customer and business demands, site reliability engineers and IT Ops analysts now require operational visibility into their entire architecture, something that traditional APM tools, dev logging tools, and SRE tools aren’t equipped to provide. Observability enables you to inspect and understand your IT stack on premises and in the cloud(s); It’s no longer about whether your system works (monitoring), but being able to task why it is not working? (Observability). This presentation will outline key steps to take to move from monitoring to observability.
Session by Dan Holme at our monthly #M365UGZA session:
Everything you need to know about Viva Engage
Viva Engage gives leaders and communicators powerful new tools to reach and engage audiences. Send need-to-know announcements across channels. Humanize leadership with storyline. Listen to and learn from employees with ask-me-anything events. Spark participation with social campaigns. Measure and improve effectiveness with Copilot and analytics including audience sentiment. And bring it all together in leadership corner. Learn how to transform employee engagement, communications, and leadership effectiveness with Dan Holme, a product leader on the Viva Engage team.
Kerberos is a network authentication protocol that provides secure authentication for client/server applications. It uses secret-key cryptography and relies on a trusted third party called the Key Distribution Center (KDC) which is aware of all systems on the network. Kerberos introduces tickets that allow a client access to a server after initial authentication with the KDC. The authentication process involves the client receiving a ticket-granting ticket from the KDC and then exchanging messages with the ticket-granting service and target server to gain access.
Path to Production: Value Stream Mapping in a DevOps WorldVMware Tanzu
The document discusses using value stream mapping (VSM) in a DevOps world to increase the efficiency of software delivery. It defines VSM and its goals, and provides examples of its use for mapping a software development lifecycle (SDLC). Key aspects covered include identifying value-adding vs non-value-adding processes, involving the right stakeholders, capturing metrics like lead time and process time, and using VSM to reduce waste and continuously improve releasing software to production faster. Challenges for regulated industries are also addressed, emphasizing balancing controls with increasing velocity.
Creating Accessible Inclusive Social Media Content.pptxTumwine Edward
The document discusses best practices for creating accessible and inclusive content for social media platforms. It notes that accessibility is important to connect with all audiences, including the disabled, and to comply with disability laws. It provides tips for making text, images, videos, audio, and emojis accessible. Some tools highlighted for creating captions and transcripts include Veed, Clipchamp, and Headliner. The document concludes with a link to an Alt Text generator and a checklist for accessibility.
One of the simplest ways to make information more accessible is to add alternative text (alt text for short). It’s brief descriptions of images for users who can’t see them. But what to write? This is a deep dive into writing alt text that is usable and useful. You’ll learn how the right words can make images speak clearly.
Updated for AccessU and AccessU Summit 2017
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
This is based on the following publications:
Azure Strategy and Implementation Guide by Joachim Hafner, Simon Schwingel, Tyler Ayers, and Rolf Masuch. Introduction by Britt Johnston.
With reference to Enterprise Cloud Strategy, 2nd Edition by Eduardo Kassner and Barry Briggs.
All Links to resources are at the end of the presentation.
Migrating on premises workload to azure sql databasePARIKSHIT SAVJANI
This document provides an overview of migrating databases from on-premises SQL Server to Azure SQL Database Managed Instance. It discusses why companies are moving to the cloud, challenges with migration, and the tools and services available to help with assessment and migration including Data Migration Service. Key steps in the migration workflow include assessing the database and application, addressing compatibility issues, and deploying the converted schema to Managed Instance which provides high compatibility with on-premises SQL Server in a fully managed platform as a service model.
The document discusses how MuleSoft's Anypoint Platform can be used to connect applications, data, and devices across systems in order to create integrated experiences for customers. Some key points:
- The Anypoint Platform provides a single solution for API management and integration that allows organizations to connect any application, data, or device.
- It offers pre-built connectors and templates that can accelerate development times. Projects using the platform see up to 64% faster delivery and 40% increased productivity.
- When combined with Salesforce, the platform unlocks enterprise data and helps create a single customer view across systems through integrations between front and back office applications.
This document summarizes an event about Microsoft 365 Copilot hosted by Pune Tech Community. The event featured a presentation and demo of M365 Copilot by Vignesh Ganesan. Copilot is an AI assistant currently in early access that can help automate tasks across M365 apps like Word, PowerPoint, Excel, Outlook and Teams. The presentation provided an overview of Copilot's capabilities, a demo of its features, and discussed considerations for enterprises looking to pilot Copilot, including technical prerequisites, licensing costs, and developing a pilot program. Useful resources for learning more about Copilot were also shared.
Web Services Security (WS-Security) is a proposed standard that addresses securing data exchanged as part of a web service. It provides authentication, authorization, confidentiality, integrity, and non-repudiation. Security can be implemented at the transport level using SSL/TLS to secure the communication channel, or at the message level by securing the SOAP message itself using standards like XML Encryption, XML Signature, and WS-Security. Transport level security secures the connection, while message level security secures individual messages and allows security to travel with the message between applications and intermediaries.
VOWLMap: Graph-based Ontology Alignment Visualization and EditingCatia Pesquita
VOWLMap is a tool for visualizing, editing, and validating ontology alignments. It implements the Visual Notation for OWL Ontologies (VOWL). Available at: https://github.com/liseda-lab/VOWLMap
Integrating your on-premises Active Directory with Azure and Office 365nelmedia
This document provides an overview and instructions for integrating an on-premises Active Directory with Azure Active Directory and Office 365. It discusses the different identity models and options for synchronization and federation. It also provides tips and tools for setup, administration, and troubleshooting the integration. The included lab setup guides taking an existing Windows Server 2012 R2 VM, adding Active Directory, and configuring synchronization with Azure AD and user creation.
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...Sonatype
There are numerous examples of DevOps and Continuous Delivery reference architectures available, and each of them vary in levels of detail, tools highlighted, and processes followed. Yet, there is a constant theme among the tool sets: Jenkins, Maven, Sonatype Nexus, Subversion, Git, Docker, Puppet/Chef, Rundeck, ServiceNow, and Sonar seem to show up time and again.
The document provides an overview of an assessment that analyzes a company's readiness to transition to cloud computing. It outlines a survey that collects business and technical information to evaluate key gaps and make recommendations on leveraging IBM's cloud offerings. The survey addresses factors like business goals, pricing strategies, infrastructure management, and virtualization to develop a customized plan to accelerate the company's cloud transformation.
Mass Migration Strategy - A Key Step in the Enterprise Transformation - AWS C...AWS Germany
Vortrag "Mass Migration Strategy - A Key Step in the Enterprise Transformation" von Angelo Crippa beim AWS Cloud Web Day für Mittelstand und Großunternehmen. Alle Videos und Präsentationen finden Sie hier: http://amzn.to/1VUJZsT
Showcase development processes and methods with our content ready Devops PowerPoint Presentation Slide. Focus on rapid application delivery using our visually appealing development and operations PPT visuals. The operating system PowerPoint complete deck comprises self-explanatory and editable PowerPoint templates such as need for DevOps, best practices, criteria for choosing a pilot project, DevOps goals, timeline for DevOps transformation, current state future state, 30-60-90 day plan, roadmap for DevOps, transformation post successful DevOps Implementation, RACI matrix, dashboard to name a few. Users can easily customize all the templates as per their specific project needs. Furthermore, you can also use this IT operations management presentation deck to encourage your team to adopt DevOps culture practices and tools. Demonstrate DevOps goals like Increase automation and standardize the process, reduce cost effort & time to market and so on. Download our system development lifecycle PowerPoint templates to present ways to make improved products faster for greater client satisfaction. Handle deficiencies with our DevOps Powerpoint Presentation Slides. Initiate action to acquire desired assets. https://bit.ly/3y8q8NC
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)Amazon Web Services
The document discusses the 6 Rs migration strategy for identifying migration options to AWS: Retain, Retire, Rehost, Replatform, Refactor, and Rearchitect (Replace). It provides descriptions and considerations for each option. It also discusses Scholastic's use of various migration strategies like Retain, Rehost/Replatform, Rearchitect, and Refactor for different applications. The document emphasizes using an assessment-based approach and mapping business drivers to the appropriate migration strategy.
The document discusses how to implement site reliability engineering (SRE) practices without having an SRE on the team. It recommends starting with setting service level indicators (SLIs) and service level objectives (SLOs), establishing rules for how the system should function and an incident response process, and always performing postmortems after incidents to document failures and fixes. The document also provides some best practices for code deployment, managing on-call responsibilities, and finding automation opportunities. Useful resources for learning more about SRE are also listed.
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It authenticates over 1 trillion times since release and manages identity data for over 5 million organizations, including 86% of Fortune 500 companies using Microsoft Cloud services. Azure AD provides single sign-on, multi-factor authentication, and application access management across devices and platforms.
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...Splunk
With the acceleration of customer and business demands, site reliability engineers and IT Ops analysts now require operational visibility into their entire architecture, something that traditional APM tools, dev logging tools, and SRE tools aren’t equipped to provide. Observability enables you to inspect and understand your IT stack on premises and in the cloud(s); It’s no longer about whether your system works (monitoring), but being able to task why it is not working? (Observability). This presentation will outline key steps to take to move from monitoring to observability.
Session by Dan Holme at our monthly #M365UGZA session:
Everything you need to know about Viva Engage
Viva Engage gives leaders and communicators powerful new tools to reach and engage audiences. Send need-to-know announcements across channels. Humanize leadership with storyline. Listen to and learn from employees with ask-me-anything events. Spark participation with social campaigns. Measure and improve effectiveness with Copilot and analytics including audience sentiment. And bring it all together in leadership corner. Learn how to transform employee engagement, communications, and leadership effectiveness with Dan Holme, a product leader on the Viva Engage team.
Kerberos is a network authentication protocol that provides secure authentication for client/server applications. It uses secret-key cryptography and relies on a trusted third party called the Key Distribution Center (KDC) which is aware of all systems on the network. Kerberos introduces tickets that allow a client access to a server after initial authentication with the KDC. The authentication process involves the client receiving a ticket-granting ticket from the KDC and then exchanging messages with the ticket-granting service and target server to gain access.
Path to Production: Value Stream Mapping in a DevOps WorldVMware Tanzu
The document discusses using value stream mapping (VSM) in a DevOps world to increase the efficiency of software delivery. It defines VSM and its goals, and provides examples of its use for mapping a software development lifecycle (SDLC). Key aspects covered include identifying value-adding vs non-value-adding processes, involving the right stakeholders, capturing metrics like lead time and process time, and using VSM to reduce waste and continuously improve releasing software to production faster. Challenges for regulated industries are also addressed, emphasizing balancing controls with increasing velocity.
Creating Accessible Inclusive Social Media Content.pptxTumwine Edward
The document discusses best practices for creating accessible and inclusive content for social media platforms. It notes that accessibility is important to connect with all audiences, including the disabled, and to comply with disability laws. It provides tips for making text, images, videos, audio, and emojis accessible. Some tools highlighted for creating captions and transcripts include Veed, Clipchamp, and Headliner. The document concludes with a link to an Alt Text generator and a checklist for accessibility.
One of the simplest ways to make information more accessible is to add alternative text (alt text for short). It’s brief descriptions of images for users who can’t see them. But what to write? This is a deep dive into writing alt text that is usable and useful. You’ll learn how the right words can make images speak clearly.
Updated for AccessU and AccessU Summit 2017
Alt means alternative text. A look at how to write it, thinking about audience, content, context.
These slides are from the Accessibility Summit, 2014. Register for access to recorded sessions:
http://environmentsforhumans.com/2014/accessibility-summit
The document discusses how technology has changed the meanings of some common words:
- "Stream" now refers to media delivered continuously online rather than a flowing body of water.
- "Thing" in the context of the "Internet of Things" means a smart connected device rather than a generic object.
- "Feed" is now more associated with RSS feeds for blogs and news rather than food for animals.
- "Tag" in computing refers to HTML tags, keywords for information tagging, rather than price tags on products.
- "Viral" describes rapidly spreading online content rather than biology and viruses.
- "Troll" online means someone provoking arguments for fun rather than
Accessible Social Media for an Inclusive CommunityEmily Allen
Speakers:
Cecilia Warren, Maryland Dept of Disabilities & Emily Allen, Maryland Emergency Mgmt Agency
Session Description:
Does your communication plan ensure that social media reaches all members of the community? Preparedness and public safety messages miss a significant portion of the community if they cannot be accessed with assistive technology. Learn how to adapt your social media messages to make them accessible. Strategies to overcome common accessibility barriers will be discussed. Discover tools that you can start using today to improve the accessibility of your agency's social media campaign.
Creating Accessible Public Health Communicationskatiequigley33
Creating accessible and inclusive digital communications is critical for building public health trust and promoting health equity. This webinar by the Public Health Communications Collaborative offers practical tools, tips, and examples for enhancing accessibility in your public health communications.
Name __________ Grading Rubric for a Power Point Projec.docxroushhsiu
The document provides a grading rubric for a PowerPoint project. It evaluates various elements of the project on a scale from 1 to 5 in these categories: content, slide creation, slide transitions, pictures/images, mechanics, and technology use. For each category, it describes the criteria for meeting expectations and excelling. Overall, the rubric provides a detailed breakdown of the standards and quality levels for the PowerPoint assignment.
With more and more people using tablets for reading technical documentation, this webinar looks at how this trend will affect the way technical documents are designed and developed. We'll look at examples of documents that 'work' on a tablet, as well as documents that don't. We'll explore some of the emerging design trends for presenting technical documentation on tablets, and what they mean for Technical Writers. We'll also investigate how tablets, and the technologies contained within then, could be used to improve the User Assistance we provide to our readers.
Ellis is Director and Help Strategist at Cherryleaf, a technical writing services and training company based near London, in the United Kingdom. He has over fifteen years’ experience working in the field of documentation, has a BA in Business Studies, and is an Associate of the Institution of Engineering and Technology. Ranked the most influential blogger on technical communication in Europe, Ellis is also an author and editor of two books: ‘How to Write Instructions’ and ‘Trends in Technical Communication’.
Design Considerations for Web AccessibilityNeha Gupta
This document discusses design considerations for web accessibility. It begins by defining web accessibility and noting its importance given the large number of people with disabilities. It then outlines the POUR principles of perceivable, operable, understandable, and robust. The rest of the document provides examples of how to make various web elements accessible, such as using alt text for images, ensuring sufficient color contrast, adding captions to videos, using logical heading structures, and associating form labels. The goal is to design web content that can be perceived, operated, and understood by all users, including those with disabilities.
Dyslexia: notes from the field is a presentation by Lisa Matthews about her experiences living with dyslexia. It is presented in a slide format but also as a durational artwork. The presentation includes 6 sections: a definition of dyslexia, how dyslexia affects Matthews day-to-day, describing dyslexia as not always a superpower, things not to say to someone with dyslexia, things that help those with dyslexia, and discussing both good and not-so-good design experiences. Matthews hopes sharing her experiences can help increase awareness of dyslexia on Global Accessibility Awareness Day.
Social Media PerceptionOur choices of social media shape our.docxsamuel699872
Social Media Perception
Our choices of social media shape our perceptions of events, issues, and people. Cultural memberships influence the content of digital and online communication. Social media have altered how we perceive time and space. People tend to feel anonymous online, even when they have a name associated with their avatar. On the internet, computer mediated conversations lack body language, voice intonation, and other important nonverbal elements. Without these features, people are compelled to fill in the gaps with assumptions about the nonverbal elements.
For some reason, people become much more sensitive when they’re online, and they tend to blow things entirely out of proportion—for example, taking a couple of sentences originally meant to be humorous or sarcastic entirely the wrong way. It’s even worse if you’ve had a bad day and you’ve decided that “no one likes you” (we’ve all had those moments); you’re much more susceptible to misunderstanding messages. Once that happens, everything can go downhill quickly. Instead of asking for clarification (“You were kidding, weren’t you?”) or just ignoring it, many people—forgetting that they’re dealing with another human being on the other end—decide to defend themselves and tell the originator of the offending message exactly what they think of him or her. This outcome is what’s known in the business as a flame. If both sides begin insulting each other, it’s called a flame war (kind of like fighting fire with fire). These digital battles often erupt in “public” and can sometimes be very entertaining to the lurkers.”
Read the article “
The Secret Cause of Flame Wars
” to get started on this topic.
Assignment Details:
· Create a 5 – 10 slide PowerPoint Presentation with audio. Add your own audio recordings to each slide.
· Include a title slide (with your name and introduce the topic you’ll be sharing in the presentation).
· Then include slides and describe a situation online where you witnessed trolling and flaming. What was the situation? How were the comments handled?
· Do you think this same situation would have happened in a face-to-face environment? Why or why not?
· How can situations like this be minimized? Please use the terms for your text about social media and nonverbal and guidelines for improving nonverbal communication found in Chapter 5 to respond to this question.
· Your audio PowerPoint presentation should be 3-5 minutes in length, citing specific examples and providing detailed analysis incorporating reading and textbook material. If outside sources are used, proper citation of the source should be included at the end of the PowerPoint on a reference slide.
Tip: 3 – 5 minutes of an audio presentation is roughly equal 600 to 750 words.
To add audio in PowerPoint go to the top INSERT tab and to the right under Media you’ll see “Audio” where you can record your voice for the presentation.
.
The document provides an overview of the evolution of computer-mediated communication over the past 20 years. It discusses how home computers have become vastly more powerful and how most people now engage in computer-mediated communication daily. It also outlines some key properties of electronic texts, such as plasticity, links, tagging, searches, templates, and footprints. The document examines different types of computer-mediated communication that have emerged, such as emails, web pages, online discussions, and provides questions to analyze how these examples make use of the identified electronic text properties.
This document provides tips and instructions for using various features in the Discovery Education streaming platform, including searching for media by curriculum standards or subject/grade, using audio speeches and related materials, incorporating images into projects, and creating interactive activities like timelines using DE media in conjunction with other web tools. Key features highlighted are curriculum standards alignment, primary sources like speeches and images, and ways to embed and share DE content in other digital formats.
This document provides an overview and review of the material covered in an Introduction to Computers class over one semester. It lists the 11 lessons covered, including topics like chat acronyms, GUIs, memes, URLs, Google searches, binary systems, YouTube subtitles, and cloud computing. It outlines the final exam questions and directs students to a review website. It also reviews the topics of cloud computing and TED lectures, providing details on what they are, examples, advantages/disadvantages, and software used, and guides students through watching selected TED talks.
This document provides information and guidelines about web accessibility. It defines accessibility as making web content usable by people with disabilities, on different devices and technologies. Websites must comply with federal laws requiring accessibility. The APS Web Team provides help to ensure compliance. Inaccessible sites can exclude 20% of users, including those with disabilities, older/younger users, and those using older devices or technologies. Guidelines are provided for accessible text, images, files, tables and more.
Precedent #usabilityfail seminar part twodan-baker
Slides from part two of #usabilityfail: stop wasting your marketing budget on bad usability.
Seminar presented in Perth, Western Australia November 2011
The document provides information about reading and writing skills. It discusses different strategies a survivor could take in a zombie apocalypse scenario, such as trying to find help, searching for food and water, staying in one place, or fighting for safety. It also mentions making decisions about visiting historical events, handling challenges calmly, or preventing disasters by time travel. The document then covers topics like hypertexts, including definitions and examples, as well as activities for students to discuss hypertexts and designing one for an online store or course.
Advancing Equity and Inclusion for Deaf Students in Higher Education3Play Media
This document discusses advancing equity and inclusion for deaf students in higher education. It notes that deaf students experience isolation and barriers to participation in campus activities due to a lack of accommodations and support services. The document calls for systemic changes to structures, relationships, and attitudes to improve accessibility, inclusion and belonging for deaf students on campus. This includes centralized accessibility systems, campus-wide training, transparent policies, and including deaf students in decision-making. The goal is for colleges to move beyond legal compliance and ensure deaf students have a holistic college experience through meaningful inclusion.
"Am I Doing This Right?" Imposter Syndrome and Accessibility Maturity3Play Media
Register for this free webinar to learn ways to navigate challenges, embark on an exciting growth trajectory, and ensure a smooth accessibility career journey.
The 3Play Way: Real-Time Captioning in Higher Education3Play Media
During the session, you will gain insights into 3Play Media’s technologies and integrations to understand how these tools work in harmony with our highly skilled captioners to provide seamless, real-time captions that meet the highest standards of quality. Whether it’s live lectures, virtual classrooms, or campus events, our real-time services ensure that students have equal access to educational content.
Developing a Centrally Supported Captioning System with Utah State University3Play Media
Join us for a spotlight chat with Utah State University (USU) as they share their remarkable journey in developing a centrally supported captioning system across their statewide university campuses. This engaging webinar will delve into the various aspects of their captioning initiative, highlighting the challenges they faced, the strategies they've implemented, and their progress so far.
Lessons Learned: Canada’s Past, Present, and Future Leadership in Digital Acc...3Play Media
Canada is recognized as a global leader in digital accessibility, most recently with their introduction of the Accessible Canada Act. Like all countries, Canada has an imperfect history when it comes to accessibility and inclusivity, but what can others learn from Canada in how to operationalize an accessible ecosystem? How can other countries build inclusive practices into their culture and legislation?
On Global Accessibility Awareness Day (GAAD), join us as David Berman, an internationally recognized expert in inclusive design and strategic communications, discusses Canada’s history of leadership in accessibility, as well as predicting where the puck is heading regarding regulations and emerging standards that can benefit everyone within and beyond its borders.
David will share experience and insights that will help you leave no one behind online... while enjoying the “Accessibility Dividend” for all.
This document discusses product innovation and inclusive design. It begins by introducing Solomon Romney, an accessibility program manager at Microsoft. It then discusses the evolution of game controllers and mismatches in interactions. The challenges of innovation include the diversity of human experiences and disabilities. Two billion people will need assistive technologies by 2030. The document advocates designing for one population, like those with disabilities, which can benefit many. It presents Microsoft's framework for inclusive design and reasons to invest in accessibility, like ethical responsibility. The document concludes by noting the importance of storytelling and data in influencing inclusive design.
Why Every Company Needs to Think and Act Like a Media Company3Play Media
In this session, we will explore what it means to operate as a media company by owning your own channels and ensuring your content is accessible to a diverse audience.
2023 State of Automatic Speech Recognition3Play Media
This session will discuss the findings from a 2023 research study of leading ASR engines to understand how speech AI measures up to the task of captioning and transcription without the intervention of a human editor. The study tested 549 files across nine industries, testing approximately 107 hours of content with a total of over 900,000 words.
This document discusses disability inclusion in leadership and the workplace. It defines disability inclusion as creating an inclusive culture for all, beyond just accommodations for individuals who disclose disabilities. It discusses barriers to inclusion such as myths and assumptions about disabilities. Practical best practices for inclusive managers and leaders are provided, such as creating flexibility, adopting inclusive meeting practices, and understanding one's role in advocating for team members and creating a psychologically safe environment. The document emphasizes that inclusion benefits all.
Although Universal Design for Learning (UDL) is commonly heard of in higher education, most are implementing it at the level of individual interactions or think it's just another facet of accessibility efforts. During this session, we will build on the foundational knowledge of UDL to create expert-level UDL systems at our institutions. We will work together to develop observation and assessment techniques for UDL to create a foundation from which we can build.
Neurodivergency at work (P2) – 3Play and B-I.pdf3Play Media
This document summarizes a presentation on neurodiversity in the workplace. It discusses establishing an inclusive office culture, clear communication, and accessibility best practices. The presentation covers establishing a hidden curriculum for expectations, providing agendas and captions for meetings, using accessible formats and describing visuals. Clear project-based communication is emphasized, including establishing roles and checking for understanding. Performance reviews should provide specific, corrective feedback to improve task accuracy for neurodiverse employees.
Neurodiversity in the Workplace - Part 13Play Media
This webinar, presented in partnership with Tara Cunningham from Beyond-Impact, aims to illuminate the experiences of neurodivergent people in the workplace – from the first interview to annual performance reviews. We’ll discuss the impact of a neurodiverse team on overall productivity and communication, as well as introduce easy-to-implement accommodations that could benefit neurodivergent employees… and your organization as a whole.
How To Deliver an Accessible Online Presentation3Play Media
The document discusses how to design online presentations to be accessible to people with a wide range of abilities. It recommends taking a universal design approach that proactively designs for all people rather than just those with disabilities. Specific tips include using captioned videos, structured text, high contrast colors, and offering multiple ways for people to engage. The document also notes that the needs of deaf/hard of hearing people are diverse and flexibility in information delivery is important. Overall it promotes accessibility practices that benefit everyone.
In this webinar, Bet Hannon, Founder and CEO of AccessiCart, gave non-technical, practical tips for improving website accessibility and discuss the benefits of having an accessible site.
2022 Digital Accessibility Legal Update.pdf3Play Media
3Play Media’s annual end-of-the-year Digital Accessibility Legal Update with Lainey Feingold.
Learning Objectives:
--Legal requirements impacting digital accessibility (primarily in the US, touching upon international requirements).
--Updates on major digital access court cases, laws, regulations, and settlements over the past twelve months.
--Best practices for digital accessibility to stay ahead of the legal curve as defined by industry leaders, court orders, and major settlements.
-- Ethics in the digital accessibility legal space (centering disabled people and avoiding fear, quick fixes, and shortcuts).
Intro to Live Captioning for Broadcast.pdf3Play Media
This document provides an introduction to live closed captioning for broadcast. It defines key terms like closed captions, live closed captions, voice writing and stenography. It explains that live captioning requires highly trained professional captioners and focuses on comprehensibility with 95-98% accuracy. Best practices include providing prep materials, using a strong network connection and highly trained captioners. Virtual encoders are growing to deliver live captions to online streams. Relevant US and Canadian accessibility laws like the CVAA and AODA that regulate closed captioning are also summarized. The document introduces 3Play Media as a premier media accessibility provider that offers captioning, transcription, subtitles and audio description services.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
14. raised hand
raised hand: light skin tone
raised hand: medium-light skin tone
raised hand: medium skin tone
raised hand: medium-dark skin tone
raised hand: dark skin tone
15.
16.
17.
18.
19. • Use them in moderation
• Double-check their description before
using them
• Place them at the end of posts and
tweets to avoid clarity issues
• Try to resist changing the color on
customizable emoji unless a specific
skin tone is necessary for context
Best Practices for Emoji
27. Hand holding
up a small
fuzzy orange
kitten with
amber-colored
eyes and a
pink nose.
White Ferris
Wheel with
multi-colored
cars under a
clear blue sky.
Dark-haired
woman in a
denim jacket
holding a baby
in a yellow
sweater above
her head.
28.
29. Management Platforms
Agorapulse X X X
Buffer X
Emplifi X X X
Facebook Creator Studio X X
Falcon X X X
Hootsuite X X X
Publer X X X
Sked Social X X X X X
Sprinklr X
Sprout Social X X X
30. Example Alt Text:
A man and woman kiss. The
man wears a tuxedo, and the
woman wears a white wedding
dress and veil that swirls
around them.
Write in plain language
31. Example Alt Text:
Ferris Wheel lit up under a
starry night sky at a carnival
crowded with people.
Focus on accuracy, not length
32. Example Alt Text:
Worm’s eye view of ten palm
trees swaying in the wind.
Consider positional information
33. Example Alt Text:
Colorful illustration of five
different doctors working on
and researching an over-sized
kidney model.
Exclude writing “image of” or “photo of”
34. Example Alt Text:
Mount Rushmore is shown
under a hazy blue sky. The
cliffside in front of it is dotted
with evergreen trees.
Use proper nouns and names
35. Example Alt Text:
A busy intersection in New
York City is filled with cars and
people at night. Bright digital
billboards cover the buildings.
Don’t describe every single detail
36. Example Alt Text:
Young Black girl with long curly
hair sits in front of a large
desktop computer while
learning about different
careers in technology.
Use personal identifiers when needed
37. Example Alt Text:
A group of about twenty people
sit in rows of chairs at a
session for the 2021 Higher
Education Social Media
(H.E.S.M.) Conference.
Avoid abbreviations whenever possible
38. Example Alt Text:
Partial view of a man wearing
black Chuck Taylor high-top
shoes, denim shorts, and a
gray t-shirt sitting on his
luggage on the side of a
country road while the sun sets
behind him.
Add keywords for improved SEO
39. Example Alt Text:
View of a man from behind. He
stands atop a hill with his arms
outstretched, looking over a
green valley under a cloudy
blue sky. Text over him reads
freedom.
Avoid excessive flattened copy
40. • Emoji Icons
• Links
• Hashtags
• Additional Symbols
• Nonessential Info
What to Avoid in Your Alt Text
47. An audio description is a form of narration
used to provide info surrounding key visual
elements in videos for blind and low vision
consumers.
Audio Descriptions
48. • Typically adds an additional audio track
to a video that can be toggled on and off
• You cannot add multiple audio tracks to
one video on YouTube, Vimeo, or most
social media platforms
o Create two versions of your video, one with
an audio description integrated with the
rest of your video’s audio and one without
49.
50.
51. [captions make a video accessible]
Learning disability
Attention deficit
Autism
Different language
Noisy environment
Poor audio
Fast talker
Speaker with an accent
Hello
54. 1. Upload your video to your YouTube channel as unlisted.
2. Allow YouTube time to generate auto-captions.
3. Click Duplicate and Edit and revise the auto-captions.
4. Publish your edited captions.
5. Delete the auto-captions for the video.
6. Allow YouTube time to process your edited captions
and sync their timing.
7. Switch the status of your video to public.
Create CC with YouTube
Hello and welcome to Accessible Social! My name is Alexa Heinrich and I’ll be taking all questions at the end, so feel free to drop them in the chat or save them to be asked live.
When it comes to accessibility, many digital marketers want to know what makes it important for social media and what it means to be inclusive online. Not everyone experiences or navigates digital spaces the same way. There are millions of people with disabilities who rely on assistive technology and practices to access digital content.
There are four distinct reasons why accessibility matters. [CLICK]
Inclusive best practices can have a direct impact on your marketing efforts and affect how many people you reach with your digital content. [CLICK]
Like with a brick-and-mortar location or your website, you also want to make sure that your social media is meeting current accessibility guidelines. [CLICK]
Everyone at some point or another will be affected by disability, either through age, illness, or injury. Many brands and organizations are trying to focus more on Diversity, Equity, and Inclusion work, and disability is something that impacts every demographic and every area of DEI. [CLICK]
And most importantly, you should just care about the experience that your followers have when they engage with your brand or organization on social media.
According to a November 2021 report from the World Health Organization, an estimated 15% of the global population has some sort of disability. This number could also be much larger because not everyone is comfortable disclosing that they are disabled, and it includes a wide range of disabilities from physical, cognitive, learning, spinal, psychological, or sensory. For the purposes of this presentation, I will mostly be focusing on sensory disabilities that affect a person’s hearing and vision.
Disability is diverse and it comes in different forms: [CLICK]
Most people think of permanent states when disability is mentioned, such as vision or hearing loss that cannot be medically treated or reversed. But disability is the only diverse community that you can join and leave. Some individuals are born with their disability, others become disabled later in life. It’s a full spectrum of possibilities and scenarios. [CLICK]
A person could have a temporary impairment due to an injury like a bruised eye or an illness such as losing your hearing from an ear infection. [CLICK]
Someone could also have a situational impairment which means they’re affected by their environment or circumstances like having trouble seeing a screen in different levels of lighting or hearing audio in a crowded room. [CLICK]
There are also episodic disabilities, which are disabilities that have no discernible pattern. They can affect you at any given time and change how you interact with the world. Examples would migraines, vertigo, chronic pain, asthma, and some forms of mental illness like PTSD and bipolar disorder.
Now that you know WHY you should be creating accessible social media content, it’s time to learn HOW. I’m going to take us through accessible practices for copy and formatting, images and visuals, and audio and video.
Our first section will cover accessible best practices for copy and formatting. I’ll talk about hashtags, post formatting, emoji, alternative characters, and ASCII art.
When it comes to social media's favorite conversation device, make sure to capitalize the first letter in each word of your compound hashtags! This method is sometimes referred to as #TitleCase, #PascalCase, and #CamelCase.
The capital letters help assistive devices denote the separate words, allowing them to pronounce compound hashtags correctly and not as one long mish-mashed word.
Camel case is also easier for literally everyone to read no matter the status of their vision. This formatting can also be applied to your Twitter handle to make that accessible and it could save your brand from embarrassing PR moments as well. Just look up "Susan Boyle hashtag fail" if you want an excellent example of why Camel Case is a good idea.
An often-overlooked aspect of accessibility in relation to social media is formatting. For social media, this means how you lay out your posts and tweets using spaces, tabs, and hard returns. Because most social media platforms don’t offer formatting options unless you’re writing an article on LinkedIn, some users will find ways to manipulate their content to achieve the formatted look they want.
This kind of “forced formatting” is commonly seen in tweets where the author has used multiple spaces, tabs, and hard returns to make their content appear in two columns like in this example.
The example tweet looks like it’s in two columns. However, the blue arrows I’ve placed between the columns show that tabs were used to create this forced formatting. A screen reader would follow the path of the blue arrows because there’s no true gutter (the space between properly formatted columns) in the tweet that tells it to do otherwise. Therefore, the content gets read out of order. I’m going to use my phone’s text-to-speech program to demonstrate what this example tweet sounds like, and I’ll do this with several other examples throughout the presentation. I encourage you to close your eyes and just listen. Ready? Here we go. [CLICK]
Until platforms add formatting options, you should compose your social media content knowing it will be read left to right or right to left in a single column by assistive devices and programs.
You should also be aware of how you use upper and lowercase letters.
Some internet users will type in studly case to indicate mocking sarcasm in their content. Studly case is when you alternate every letter between uppercase and lowercase. It's also known as varied case or SpongeBob case due to a popular meme featuring the Nickelodeon character of the same name. The varied letter case makes it exceptionally hard for a screen reader to properly read the words and can create a confusing experience for users, as demonstrated here. Go ahead and close your eyes for me. [CLICK]
Moving onto emoji, everyone loves those colorful icons, but did you know that each individual emoji has its own unique description assigned to it?
When an assistive device or program comes across an emoji in written content, it will use the icon’s assigned description to accurately describe it to the user.
Many emoji also have descriptions and appearances that differ across platforms, devices, and browsers. This particular emoji is known as abandoned house, old house, haunted house, and derelict house.
Even emoji with skin tones get additional information added to their base description to keep them unique. If a screen reader were to read this line of emoji, it would say: raised hand, raised hand: light skin tone, raised hand: medium-light skin tone, raised hand: medium skin tone, raised hand: medium-dark skin tone, and raised hand: dark skin tone.
Keep in mind that because a screen reader picks up on the descriptions of emoji, the excessive use of them is not advised. It’s also worth noting that some assistive devices will shorten a line of emoji if only one specific icon is used uninterrupted by other icons, characters, or spaces. For instance, this group of emoji would probably be read as 24 rockets instead of a screen reader saying the word rocket 24 times.
It’s best to put emoji at the end of your content, otherwise you could make your message confusing like with this example tweet that has a few emoji sprinkled throughout the content. Once a text-to-speech program translated the emoji, the content ran into several clarity issues as demonstrated in this short screen recording. Again, I’d like everyone to close their eyes and just listen to the example as it plays.
Using emoji as bullet points is quite popular on social media, but unfortunately, using emoji that way could make your points confusing if the icon descriptions are competing with the content as shown in this second example tweet. This is your cue to close your eyes. [CLICK]
As demonstrated, the three emoji descriptions interrupted the flow of the copy and made it a little difficult to understand.
An excellent resource for digital content creators who want to use emoji in smart and strategic ways is emojipedia.org. This website lists every known emoji along with their different appearances and descriptions across platforms, devices, and browsers.
So when it comes to emoji on social media, you should:
Use them in moderation
Double-check their description before using them
Place them at the end of posts and tweets to avoid clarity issues
Try to resist changing the color on customizable emoji unless a specific skin tone is necessary for context
That last tip is for people who manage social media professionally. I would never presume to tell someone what emoji skin tones they should use to represent their race or ethnicity on their personal social media.
Another best practice for copywriting is one that focuses on a trend that has become quite popular on social media in recent years. Content creators have started using external websites to generate alternative characters for their posts to make the copy appear in different weights, styles, and fonts. You’ll notice that the yellow has highlighted text that’s in a different font from Twitter’s default font.
Unfortunately, some assistive devices cannot decipher these characters and will typically skip over them, as shown in this first example tweet. You’ll see that I used alternative characters for the first three lines of text and then Twitter’s default font for the latter half of the tweet. This is how my phone’s text-to-speech program handled it. You can go ahead and close your eyes. [CLICK]
My text-to-speech program completely skipped the first three lines that read “Custom fonts are so fun! They give your content extra pizzazz! And you can even bold your text.” This was because it could not identify them as readable characters.
Even worse are the alternative characters that assistive devices translate into indistinguishable noises or totally different languages like in this second example tweet. And shut your eyes everyone. [CLICK]
While I only showcased a few seconds of that tweet, it actually took almost two and a half minutes for my phone’s text-to-speech program to read the entire post aloud when logically it should only take a few seconds.
Content creators should only use the default fonts and formatting options readily available on the platforms.
Another popular trend on social media that involves the use of characters is called ASCII Art. It uses letters, numbers, punctuation and other characters to create illustrative memes.
ASCII Art is used more and more by major brands as they try to appear relatable and hip with their followers. However, ASCII Art is not accessible for screen reader users.
Assistive devices are programmed to read characters and punctuation marks as they were originally intended. They cannot properly discern when characters are used to create illustrations, and when read aloud, ASCII Art normally sounds something like this. Eyes closed one everyone. [CLICK]
So, the art is clever, but it doesn't make much sense once a screen reader gets ahold of it.
AUDIO TRANSCRIPT: Bullet underscore bullet X bullet underscore bullet greater than reversed not sign black square black square reserved not sign black square underscore black square Y.
This next section is typically the one that I get the most questions about: how to be accessible with images and visuals.
Images play a key part on social media, but how does someone with a serious vision disability experience a picture? Assistive devices and programs need alt text, a descriptive physical summary of the image, in order to accurately describe it to a user.
Facebook, Twitter, Instagram, LinkedIn, and Pinterest all allow users to write custom alt text for their uploaded images. Custom alt text is always preferred to automatic alt text that’s been written by an AI system because auto-generated alt text is normally vague, and not descriptive or accurate enough to be considered accessible.
This is a sampling of a few third-party management sites and their alt text publishing capabilities. Unfortunately, only Sked Social can currently post to Instagram using the app’s alt text field due to API restrictions.
If you use a third-party management system other than Sked Social and want to continue using it to publish to Instagram, you can simply write your image description directly in the caption area of your post to make it accessible.
Here are a few tips for writing effective alt text along with some examples:
Write in plain language. You should focus on describing the physical aspects of your chosen images. Resist the urge to be ornate or overly effusive with your descriptions. You want to avoid having your own feelings or opinions about an image interfere with your ability to write accurate alt text. Try to be as objective as possible.
Focus on accuracy, not length. I normally make my alt text about the length of one tweet, but that’s also dependent on the image that I choose. The more complex the image, the longer the alt text will more than likely be especially if the image features any copy. Writing alt text is a completely subjective exercise, no matter how objective you try to be, and it’ll vary image to image and creator to creator. Just focus on making your alt text as accurate as possible and you should do just fine.
Consider positional information. Think about the view someone has when they’re looking at your image. Is it a partial view of someone sitting at a table? Do you have a bird’s-eye view of a snow-covered forest? Directional or positional information can add important context to your alt text.
Exclude writing “image of” or “photo of“ in your alt text. It’s already assumed that your alt text will be for a photo or image, and a screen reader will more than likely say “image of” before or after reading your alt text. However, if your image file is something like an illustration, a painting, or even a screenshot, you can include that in your alt text because it gives the user a better idea of how to visualize the image.
Use proper nouns and names when appropriate. If a well-known person, place, or thing is in your image and it adds context to your content, go ahead and name it.
Don’t Describe Every Single Detail. If something in the image is significant to understanding the whole picture or post, describe it. If it’s not, skip it and save your characters for the important stuff. Focus on describing details that are contextually important to your entire post.
Use Personal Identifiers When Needed.
If the race, gender, ethnicity, sexuality, or another identifier for a person is relevant to the overall context of the image, feel free to add it. It also helps in this instance to think of your content as a whole. What information is included in the written part of your post? As the author, do you feel that extra identifiers in your alt text would add contextual value to the rest of your content?
For example, let's say your content is about the history of Women’s Suffrage. Including the gender and race of any people in the alt text of your images would be contextually important because both identifiers are prominent topics when talking about the history of women fighting for their right to vote.
If you’re unsure about how the subject of an image identifies or don’t want to assume how they identify, stick to neutral terms such as using “person” instead of “man” or “woman”.
Of course, the best way to ascertain how someone in your image identifies is to ask them, if you are able to do so. Just make sure to explain to your subject that you're trying to accurately represent them in your content.
Avoid abbreviations whenever possible. It’s better to type out the full name or title of a person, place, organization, or initiative because screen readers don’t always read abbreviations like acronyms and initialisms correctly. Lesser-known abbreviations also don’t add a lot of context to an image. If you use an initialism in your alt text (or any of your content for that matter), type out the full name or title first, and then place spaces or periods in between each letter of the initialism so that the screen reader says it properly.
An initialism is an abbreviation consisting of initial letters pronounced separately. Examples would be KPI, NYC, and FBI. An acronym is an abbreviation formed from the initial letters of other words and pronounced as a word. Examples would be NASA, SCUBA, and FOMO.
Add keywords for improved SEO. This piece of advice is more for images on websites than social media, but it’s a good tip to keep in mind just in case search engines ever evolve to pick up alt text on social media images. To my knowledge, they currently do not.
However, keywords in the alt text field on Instagram posts do supposedly affect search results within the app. Just make sure that you’re prioritizing the accurate description of your image first and foremost. Alt text should always be treated as an accessibility feature and not an SEO growth hack. If you can logically work your keywords into your alt text, go for it. If not, that’s what hashtags are for.
Avoid excessive flattened copy. If you’re posting a copy-heavy graphic like an event flyer or an image that has text overlayed on it, you’ll need to add alt text for all the flattened copy because a screen reader will not be able to read it.
Flattened copy is text that has been turned into an object upon being exported from whatever program it was created in. You may also hear or see it called embedded copy or outlined text.
If you drag your cursor over the text on an image and it does not highlight the individual words or characters, that means the text is no longer readable, therefore, it’s also not actionable because it cannot be clicked. JPEG, PNG, and GIF files do not support readable text. Usually, assistive devices and programs can only transcribe readable text and cannot pick up flattened copy. I’m going to elaborate on this last tip a little more in later slides since it’s an alt text rule I frequently see broken.
Now that you have a better understanding of how to write effective alt text, let's talk about what shouldn't go in your alt text.
Emoji Icons: emoji are typically added to social media content to give it added visual interest, so adding them to alt text makes no sense and could result in confusing alt text depending on the icons that you use.
Links: if you put a link in your alt text, it's not going to be clickable and a screen reader will just read it out like any other word in your alt text. Links should go in the written part of your post or tweet, not the alt text.
Hashtags: like with links, hashtags aren't clickable in alt text and do not typically add additional context that would make an image description more accessible.
Additional Symbols: symbols like the ones for trademark, copyright, and registered don't make an image description more accessible and will get read aloud by a screen reader, so avoid using them.
Nonessential Information: details like strings of random keywords, photographer credits, promotional information, calls to action, hidden messages, or other information that doesn't make your image description more accessible should not be included in your alt text.
We’re going to move onto something that greatly impacts accessibility. As I mentioned earlier, putting an excessive amount of copy onto a graphic is a bad idea. This design choice is mostly seen on Twitter where we’re limited in how long our tweets can be. You’ll see celebrities, elected officials, major brands, athletes, professional sports teams, and municipal accounts tweeting graphics like this when they want to share a long statement, apology, or update. Not only is this horribly inaccessible, but it’s just bad social media.
Ideally, when a brand, organization, or public figure needs to share a long statement, that full readable statement will live on the news or PR section of their website. While social media is great for engaging with your followers, it should never be treated like a replacement for your website.
Putting long-form statements on your website is great from an accessibility standpoint as well as an archival one. Finding a previous statement in a specific area of your website is much easier than scrolling through numerous social media feeds. After you’ve put your statement on your website, you can then link to it from a post or tweet as needed.
If you still want a visual to go with your social media content, that’s totally understandable, as most posts perform better if they have an image attached to them. Let’s pretend this image is the original statement that you wanted to share on social media. That’s a lot of copy to slam onto a single graphic and it’s not exactly easy to read.
The attention span of most social media users is incredibly short. [CLICK] Plus, a majority of people look at social media on their phones nowadays, so the likelihood of someone stopping to read your graphic is much lower if it looks like this. Adding alt text to the image may make it accessible, but it won’t make it engaging.
Instead of using the full statement for your graphic, pull a single impactful quote from it and make that your visual for social media. Remember, simple graphics work better and are more likely to be engaged with.
Make sure the alt text you add to your graphic includes all the flattened copy on it as well. The alt text for this graphic could be something like, "Blue graphic that reads, 'Graphics created for social media should be treated like billboards.'" Clear and concise.
[CLICK] Now that you have your full statement on your site in a readable format and an abbreviated visual to complement it for your social media content, you can just write something brief for your post or tweet and then include the link to the statement at the end.
Now look at our two graphics side-by-side. At a quick glance, which is easier to read and engage with?
And our final section will go over making audio and video accessible.
I know everyone is probably thinking of captions, but I want to talk about video descriptions briefly. First there are audio descriptions, which are a form of narration used to provide info surrounding key visual elements in videos for blind and low vision consumers.
They’re an accessible option on popular streaming services like Netflix, Hulu, and Disney+.
As an example, I have this screenshot from my Netflix account. The audio description option, when available for a show or movie, is housed under the same menu as captions and subtitles. You’ll find it to the left.
An audio description adds an additional audio track to a video that can be toggled on and off by supported platforms.
Unfortunately, traditional audio descriptions are not supported by YouTube, Vimeo, or most social media platforms because you cannot upload multiple audio tracks with a single video. Although YouTube is supposedly working on a feature that could soon change that.
Until then, an option for making accessible videos with audio descriptions for those platforms is to create two versions of your video, one with an audio description integrated with the rest of your video’s audio and one without
Another option for making the visual elements of your video accessible for blind and low vision users is to create a written description and have it available as readable text with your video.
Gucci did this for their “Gucci Gift 2020” holiday campaign. The campaign’s promotional video featured a 90s office throwing a retro 70s-themed party. The iconic fashion brand wrote a brief visual description of the video in the caption area on their YouTube channel and Facebook page.
The social media team for the show Wheel of Time loves to post quick video snippets on the show’s Twitter account, but many of their videos include little to no dialogue. In order to make the show’s digital content more accessible, the social media team will thread a written description to each tweet that features a video. They have been commended by many of their fans and followers for creating inclusive content like this.
And finally, we’re going to chat about captions. Now, no matter where a video is posted, whether it's on a website or social media, it should have captions (sometimes called subtitles) so that deaf and hard of hearing users can access and enjoy the content.
Captions can also provide a better experience for a viewer with a learning disability, an attention deficit, or autism. They’re also helpful if you don’t understand the spoken language, you’re in a noisy environment, a video has poor audio, or if a speaker is talking too fast or has an accent.
It’s also a well-known statistic that 85% of users watch or begin watching videos with the sound off, making captioning a good marketing move in addition to being an accessibility best practice.
I am one of those people. I have found that it’s easier for me to understand information when it’s in a visual format rather than an audio format, so captions make video content easier for me to absorb.
Captions come in two forms, closed and open. Closed captioning can be toggled on and off based on the preferences of the viewer and is typically an option on platforms like Netflix and YouTube.
Open captions, on the other hand, are permanently burned onto a video and always visible. They’re also known as embedded captions or burned captions. Open captions are normally used when closed captioning isn’t an option or if the content creator wants more creative freedom over the look and feel of their captions.
An easy way to add closed captioning to a video is to use YouTube. To do this you’re going to: [CLICK]
Upload your video to your YouTube channel as unlisted. You can now freely work on your video without it popping up in search results or showing on your channel. [CLICK]
Allow YouTube time to generate auto-captions for your video. How long this process takes will depend on the length of your video and how much dialogue it includes. After some time has passed, head to the Subtitles panel in YouTube Studio to check on the status of the auto-captions. You’ll know when the auto-captions are done because you’ll see the option to Duplicate and Edit them. [CLICK]
Once the auto-captions have been created by YouTube, click Duplicate and Edit and revise the auto-captions as needed. While YouTube’s captioning technology is decent, it doesn’t include punctuation or capitalization and sometimes struggles with proper names, so you should ALWAYS edit the auto-captions and never just publish them as-is. [CLICK]
After you’ve finished editing the auto-captions, click the Publish button in the upper right of the window. [CLICK]
Delete the auto-captions for the video so that your edited captions are the only available captions. [CLICK]
Allow YouTube time to process your edited captions and sync their timing with the video audio. How long this process takes will depend on the length of your video and how much dialogue it includes. [CLICK]
Once YouTube has finished processing your captions, switch the status of your video to public (if you want it to be public).
This is personally how I like to create closed captions because it’s free and YouTube does a bulk of the work for me. Another perk to creating your captions on YouTube is that you can download the SRT captions file for your video and use it if you upload your video directly to any platform that supports uploading SRT files with videos. You can also use the SRT file to create open captions in some video production programs.
Open captions are the practical option when closed captions aren’t readily available. There are several great and affordable captioning apps out there including MixCaptions, Clipomatic, AutoCap, Kapwing, Clips, and Threads.
TikTok also has a unique text-to-speech feature that allows you to narrate any open captions you add to your content using the text tool within the app, as demonstrated here.
Thanks for tuning in today! We’re going to head into the Q+A portion of the session now, but if you have feedback or more questions for me after we’ve all logged off for the day, feel free to connect with me online at accessible dash social dot com or find me on social media. I’m always more than happy to chat about digital accessibility!