Disconnect the thing from your profile:
‣ Go to the item
‣ Click Edit
‣ Click Disconnect in the sidebar
‣ The item stays in the system but is no longer connected to your profile
This is useful if you want to remove authorship but keep the item.
The item will no longer show up in your contributions.
48
Delete / disconnect contributions
Assignment
- Go to your event and article
- Disconnect yourself as author from both
- Delete the event
- Delete the article
- Tag both: 'delete'
Let me know when you're done!
49
Delete / disconnect contributions
Evaluation
Well done!
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of sound, and using mixed styles.
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of dialogue vs. music, and unity of style vs. multiple styles.
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of sound, and using mixed styles.
Ian Hubert is a visual effects artist from Seattle known for his work in Blender. He has worked on short films and YouTube content. His teaser trailer for the film Dynamo effectively uses lighting, tracking, and direction to showcase futuristic technology.
Hayao Miyazaki is a famous Japanese anime animator and co-founder of Studio Ghibli. His films are influenced by manga and explore a wide range of genres. Miyazaki believes animation should not be rushed and should deal with philosophical ethics.
Chuck Jones was a legendary animator for Warner Brothers, known for characters like Bugs Bunny and Road Runner. He focused on defining what characters wanted and how they moved for comedy. He was master
The extra context role can be used to manually add additional context to a page. This influences how and where the page is displayed in relation to other pages.
3. Fixed context
62
Working in the admin
Matching column
1. About role
2. Extra context
3. Fixed context The role Fixed context fixes the context of a page so it is always displayed in a certain section, regardless of its metadata. This overrides the automatic matching.
The document appears to be a training module on content management and metadata. It covers topics like the principles of metadata, creating content in the front end by adding events, organizations, articles and more. It also discusses copyright, visibility settings and working in the backend admin section. The training provides examples and assignments for trainees to practice adding different types of content to the system.
Here are the steps to create an event:
1. Click "New" and choose "Event"
2. Fill in the title, for example "My childhood memories"
3. Add a short description
4. Choose a date and time slot
5. Add an image
6. Fill in the location
7. Add tags
8. Save
Let me know if you have any other questions!
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of sound, and using mixed styles.
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of dialogue vs. music, and unity of style vs. multiple styles.
This document provides contextual information and research for an animation project. It discusses why the creator chose animation as the medium, influences from horror films, planned scenes and characters. It also provides research on animation artists and theorists such as Ian Hubert, Chuck Jones, Hayao Miyazaki, and Paul Wells. Key points of animation theory are summarized, such as principles of movement, realism, narrative vs. experimental forms, the role of sound, and using mixed styles.
Ian Hubert is a visual effects artist from Seattle known for his work in Blender. He has worked on short films and YouTube content. His teaser trailer for the film Dynamo effectively uses lighting, tracking, and direction to showcase futuristic technology.
Hayao Miyazaki is a famous Japanese anime animator and co-founder of Studio Ghibli. His films are influenced by manga and explore a wide range of genres. Miyazaki believes animation should not be rushed and should deal with philosophical ethics.
Chuck Jones was a legendary animator for Warner Brothers, known for characters like Bugs Bunny and Road Runner. He focused on defining what characters wanted and how they moved for comedy. He was master
The extra context role can be used to manually add additional context to a page. This influences how and where the page is displayed in relation to other pages.
3. Fixed context
62
Working in the admin
Matching column
1. About role
2. Extra context
3. Fixed context The role Fixed context fixes the context of a page so it is always displayed in a certain section, regardless of its metadata. This overrides the automatic matching.
The document appears to be a training module on content management and metadata. It covers topics like the principles of metadata, creating content in the front end by adding events, organizations, articles and more. It also discusses copyright, visibility settings and working in the backend admin section. The training provides examples and assignments for trainees to practice adding different types of content to the system.
Here are the steps to create an event:
1. Click "New" and choose "Event"
2. Fill in the title, for example "My childhood memories"
3. Add a short description
4. Choose a date and time slot
5. Add an image
6. Fill in the location
7. Add tags
8. Save
Let me know if you have any other questions!
Ons Amsterdam Training, gebruikersmoduleMediamatic
The document provides an overview of a training on the Anymeta content management system. It is structured in two blocks in the morning covering the User Module, followed by a lunch break and two blocks in the afternoon covering the Editor Module. The User Module covers introducing Anymeta principles like metadata and matching, page layouts, adding images and content like events and articles. Trainees are given assignments to work hands-on with Anymeta. The afternoon Editor Module covers the administration interface and how to structure a website. The training emphasizes participation and asking questions.
Presentatie Alexander Veltman KJO9- CrowdsourcingMediamatic
The document discusses crowdsourcing trends globally. It notes that crowdsourcing has increased 500% worldwide. It also lists the top five largest employers for crowdsourced work, led by Chinese companies Zhubajie.com and the Chinese military. Additionally, it provides statistics on an online platform including that it has over 12,000 freelancers, 400 uploads per week, and a total of over 50,000 uploads.
Presentatie Stijn van Balen KJO9- CrowdsourcingMediamatic
Verbeterdebuurt was founded to engage more people in improving their neighborhoods by reporting issues and starting dialogues through social media. Citizens can report issues, invite comments and votes from others, and work to turn ideas into augmented realities that improve their communities. The organization aims to get more people involved in positive neighborhood changes.
Presentatie Carl Esposti KJO9- CrowdsourcingMediamatic
Crowdsourcing involves tapping into online communities to utilize their expertise, knowledge, or time to achieve specific goals. There are several models of crowdsourcing including managed knowledge discovery, distributed human intelligence tasking, broadcast search, and peer vetted creative production. Common applications include crowdfunding, collective creativity, collective knowledge, community building, civic engagement, cloud labor, and open innovation. The document outlines seven habits for successful crowdsourcing including enterprise crowdsourcing, crowd powered business, open innovation, community building, and cloud labor.
The document discusses open data and its principles. It defines open data as public government data that is complete, accessible, machine-readable, non-discriminatory, and free of charge. It notes that open data can provide economic and social benefits when used to build applications. Examples are given of apps that have been created using open data from various cities and domains.
This document provides training on using the admin interface for the Anymeta content management system. It covers navigating to the admin, the four main tabs, advanced search, creating content, assigning content to profiles, creating redirects and alternative URIs, structuring content through sets and lists, influencing the right column, themes and navigation, merging duplicate content, and deleting content. The assignments included have the trainees practice various administrative tasks like finding and assigning a location, creating redirects and URIs, making sets, and deleting test content.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Ons Amsterdam Training, gebruikersmoduleMediamatic
The document provides an overview of a training on the Anymeta content management system. It is structured in two blocks in the morning covering the User Module, followed by a lunch break and two blocks in the afternoon covering the Editor Module. The User Module covers introducing Anymeta principles like metadata and matching, page layouts, adding images and content like events and articles. Trainees are given assignments to work hands-on with Anymeta. The afternoon Editor Module covers the administration interface and how to structure a website. The training emphasizes participation and asking questions.
Presentatie Alexander Veltman KJO9- CrowdsourcingMediamatic
The document discusses crowdsourcing trends globally. It notes that crowdsourcing has increased 500% worldwide. It also lists the top five largest employers for crowdsourced work, led by Chinese companies Zhubajie.com and the Chinese military. Additionally, it provides statistics on an online platform including that it has over 12,000 freelancers, 400 uploads per week, and a total of over 50,000 uploads.
Presentatie Stijn van Balen KJO9- CrowdsourcingMediamatic
Verbeterdebuurt was founded to engage more people in improving their neighborhoods by reporting issues and starting dialogues through social media. Citizens can report issues, invite comments and votes from others, and work to turn ideas into augmented realities that improve their communities. The organization aims to get more people involved in positive neighborhood changes.
Presentatie Carl Esposti KJO9- CrowdsourcingMediamatic
Crowdsourcing involves tapping into online communities to utilize their expertise, knowledge, or time to achieve specific goals. There are several models of crowdsourcing including managed knowledge discovery, distributed human intelligence tasking, broadcast search, and peer vetted creative production. Common applications include crowdfunding, collective creativity, collective knowledge, community building, civic engagement, cloud labor, and open innovation. The document outlines seven habits for successful crowdsourcing including enterprise crowdsourcing, crowd powered business, open innovation, community building, and cloud labor.
The document discusses open data and its principles. It defines open data as public government data that is complete, accessible, machine-readable, non-discriminatory, and free of charge. It notes that open data can provide economic and social benefits when used to build applications. Examples are given of apps that have been created using open data from various cities and domains.
This document provides training on using the admin interface for the Anymeta content management system. It covers navigating to the admin, the four main tabs, advanced search, creating content, assigning content to profiles, creating redirects and alternative URIs, structuring content through sets and lists, influencing the right column, themes and navigation, merging duplicate content, and deleting content. The assignments included have the trainees practice various administrative tasks like finding and assigning a location, creating redirects and URIs, making sets, and deleting test content.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
2. Content Management System
The principles of Anymeta 0
1. Content Management System
2. ‘Anything is a thing’
3. Metadata
3. Content Management System
The principles of Anymeta 1.
A Content Management System allows users without any technical
knowledge to contribute to a website and to share data.
- Community Management System
- User roles (view- and editright)
4. Content Management System
The principles of Anymeta 2.
“Anything is a thing”
Every item (article, event, picture) is structured with relations and
connections. This structure is created by using metadata.
5. Content Management System
The principles of Anymeta 3.
Metadata:
“Data providing information about one or more other pieces of data”
Because users and editors add metadata to their contributions, the
system ‘understands' their relation to other things.
All contributions will therefore appear in the right place and with
relevant context. This saves editors a lot of time. This automated
linking in Anymeta is called matching.
9. The principles of Anymeta
Kinds, Types and roles
Between these things
different roles are possible:
‣ Author
‣ Actor
‣ Participant
‣ Organiser
‣ Fan
The role defines the place on
the page where the thing will
show up.
9
11. The principles of Anymeta
Domainmodel
topic
post
note
taken at
comment interest attachment
actor resource
location author
comment
lived friend
visited knows
is in interest
interest
mmember
interest moderator
author
actor forum
interest
person
story author
actor interest interest
participant author author
works for organized by
interest interest actor
actor set
interest
article
news
about us
author organized by
actor presented at event
organized by
project
author
publisher actor
website organization publisher publication
11
31. The prinicples of Anymeta
Assignment
- Complete your profile
- Questions?
- Short break
31
32. Block 2
Creating content in the front-end
- The role of text and pictures in list items
- Creative Commons
- Visibility & Accessibility
- Assignment
- Evaluation of Assignment
32
33. The role of text and images in list items
List items
A list item is a summarized
view of the item in the
detailed view.
33
34. The role of text and images in list items
List items
- Add an image
- Use clear & 'cliche' titles
- Keep the intro to the point
- Add metadata
- Important things at the top
- Do things right the first time
34
36. Assignment
Gadget
- Go to ‘new contribution’.
- Add an article, only add text
- Add an event, only add text
- Add a date to the event and link it to an organization and a location
- Make sure the organization and location have an address
- Add the tag: ‘gadget’
36
40. Creative Commons
Hyperlinks
Remember:
[url <space> name of the link] = name of the link
http:// is not neccessary
Examples:
[mediamatic.net A nice website] = A nice website
[flickr.com/3456/creativecommons/o/ Flickr link] = Flickr link
[blogspot.eveline.com My weblog] = My weblog
40
44. Creative Commons
Checklist for images
1. Title: what do you see, what is it
2. Caption: Name artist, description, year, source
3. Source: By owner found on source
4. Adjust creative common settings if needed
5. Tag people in the image
44
45. Creative Commons
Assignment
1. Use creative commons on Flickr to find images. Add an image to your event
and article
2. Include a title and caption with source
Remember: By owner found on flickr.
[flickr.com Flickr] will become a link: Flickr
3. Remove yourself as photographer of the picture if you’re not.
4. Adjust copyright settings if needed
Do it right the first time – it will save you time
45
47. Delete / disconnect contributions
Delete contributions
There are two options to delete things:
1. Delete the thing (trashcan)
‣ Delete the item from My contributions
2. Disconnect the thing ‣ Use the Delete button in the edit bar
‣ The item is deleted, but the connection
in still there:
47
48. Delete / disconnect contributions
Disconnect contributions
There are two options to delete things:
‣ Disconnect the thing by clicking the red cross
1. Delete the thing (trashcan)
2. Disconnect the thing
‣ The item is still in your contributions
48
51. Working in the admin
Introduction
= Front
= Back
Possible to search on ID
You can do more in the admin
Create navigation, specify kinds with types, change the owner
Go to /admin and click home
51
56. Admin assigment 1
Create connections in the admin
1. Find a location on Mediamatic.net (and write down the ID)
2. Go to your profile and click Admin
3. Find the role Lives and connect the location to your profile
4. You may delete it again by choosing ‘disconnect’ in the dropdown
5. Don’t forget to save your changes
56
57. Admin assigment 2
Alias: merge two thing together
Atlanta
Second Life
shanghai
Singapore (*)
Sofia Bulgaria
Keep the things that have:
St. Petersburg
- Text
- Type country stockholm
- Language versions Strasbourg
Sundvall
Switzerland
The Hague
Ulm
Warsaw
Wymbritseradeel
57
58. Working in the admin
Matching column
The matching column automatically fills itself due to the metadata
that is added to the different contributions, but it ís possible to
influence this a bit, with...
1. About role
2. Extra context
3. Fixed context
58
59. Working in the admin
Matching column
The about role can be used when the one
1. About role page actually is about another page.
2. Extra context
3. Fixed context
59
60. Working in the admin
Matching column
1. About role
2. Extra context The role Extra context can be used when
3. Fixed context you want a specific listitem to always
show on top in the matching column.
60
61. Working in the admin
Matching column
1. About role
2. Extra context
3. Fixed context The role Fixed context can be used when
you want to show one or more listitems in
stead of the automatic matching.
61
62. Block 2
Structuring content
Structure content
Create a set
Create a subnavigation
Create a listpublish
Tips & tricks
62
66. Assignment 3
Create a set
- Go to the /admin and create a new set
- Title ‘Your name’s set’
- Give it a short title
- Add your article, event and profile as setmembers
- Change the order of the set members
- Publish
- Make it visible to me only
66
68. Assignment 4
Theme navigation
- Add your set to the ‘Anymeta training navigation set’ (156772)
- Go to the admin of your set and check the theme ‘Anymeta training’
- Check ‘navigation’ in your set (for a dropdown)
- Go to the admin of the pages in your set and check the theme ‘anymeta training’
68
70. Structure content
Listpublish
You can specify...
- the things you want to show
- the order
- how many results per page
Examples: search, calendar, latest comments, list of
participants, all pictures taken at an event
70
73. Structure content
Structuring content
Article, Event
Set Listpublish Blog
etc.
Related
no yes
context
Control yes yes yes no yes
Pager no no yes yes
73
74. Assignment 6
Disconnect and delete
1. Disconnect your set from the Anymeta training theme (156772)
2. Delete your set
3. Go to My contributions
4. Make sure all training (test) content is deleted
74