SlideShare a Scribd company logo
Cal Net Technology Group|Q3 Report

QUARTER 3 REPORT
JULY – SEPTEMBER 2012
PREPARED BY: talkTECH Communications, LLC
Key Data Q3
• Managed and garnered over 524 Twitter followers for @ZSchuler with a
  reach of64,683during the quarter
• Managed and garnered over 764 Twitter followers for @CalNetTechLuca
  with a reach of 71,071 during the quarter
• Managed and generated over 500 LinkedIn connections for Zack
• Drafted, posted and seeded 8 blog posts
• Garnered 3 feature media placements
• Currently drafting Roberts Container case study
• Currently drafting CNEPG news release
• Created and pitched 1 infographic (IT Security Trends & Facts)
• Drafted and pitched 1 byline article (Improvements for Windows 8 on PC –
  pending placement on IT Jungle)
• Drafted 2 news releases: over 2,885 news release views
Twitter Analytics

        @zschuler - Reach 97/01-9/25)
7000


6000


5000


4000


3000                                    count

2000


1000


   0




              Total: 64,683
Twitter Analytics

       @CalNetTechLuca - Reach (7/01-9/24)
4500

4000

3500

3000

2500

2000
                                             count
1500

1000

 500

   0




                      Total: 71,071
Marketing Collateral
Feature Placements
News Release

News Releases and Top Placements:
Cal Net Technology Group Announces Enterprise-Level Information Security
   Practice Options for SMBs CLICK HERE TO VIEW




Cal Net Technology Group Announces Company Growth With New Hires
   and Notable Awards CLICK HERE TO VIEW
Thank you!


   CONFIDENTIALITY NOTICE: This document contains confidential and privileged
    information intended only for the individual(s) or entity to which it has been
proposed. You are hereby notified that any dissemination, distribution, or copying of
                     this information is STRICTLY PROHIBITED.

More Related Content

What's hot

Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed Rules
Amazon Web Services
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
The TNS Group
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
K Logic Future Marketing
 
F5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing SurveyF5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing Survey
DSorensenCPR
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE - ATT&CKcon
 
Security challenges in a multi cloud environment
Security challenges in a multi cloud environmentSecurity challenges in a multi cloud environment
Security challenges in a multi cloud environment
Eyal Estrin
 

What's hot (10)

Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 
Simplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed RulesSimplify security with Trend Micro's Managed Rules
Simplify security with Trend Micro's Managed Rules
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
IaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing BoardIaaS Security - Back to the Drawing Board
IaaS Security - Back to the Drawing Board
 
F5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing SurveyF5 Networks 2009 Cloud Computing Survey
F5 Networks 2009 Cloud Computing Survey
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Sightings; John Wunder, MITRE
 
Security challenges in a multi cloud environment
Security challenges in a multi cloud environmentSecurity challenges in a multi cloud environment
Security challenges in a multi cloud environment
 

Viewers also liked

eBrochure_Design Services
eBrochure_Design ServiceseBrochure_Design Services
eBrochure_Design Services
Cornerstone Concepts
 
Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012
TalkTECHcomm
 
Sonus Q4 2012 Report
Sonus Q4 2012 ReportSonus Q4 2012 Report
Sonus Q4 2012 Report
TalkTECHcomm
 
Sonus Q3 2012 Report
Sonus Q3 2012 ReportSonus Q3 2012 Report
Sonus Q3 2012 Report
TalkTECHcomm
 
Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012
TalkTECHcomm
 
BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012
TalkTECHcomm
 
Photo album
Photo albumPhoto album
Photo album
ccolorking
 
Hospital software
Hospital softwareHospital software
Hospital software
Venkatesh_Reddy
 
מצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפהמצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפה
חשבים פלוס
 
Los simpsons y futurama
Los simpsons y futuramaLos simpsons y futurama
Los simpsons y futurama
nestorbermudezo
 
You zakelijke portretten vslideshare
You zakelijke portretten vslideshareYou zakelijke portretten vslideshare
You zakelijke portretten vslideshareHans Hiltermann
 
Essentials of Open Source Documentation
Essentials of Open Source DocumentationEssentials of Open Source Documentation
Essentials of Open Source Documentation
Moi Borah
 
How To Approach Partner Marketing Programs
How To Approach Partner Marketing ProgramsHow To Approach Partner Marketing Programs
How To Approach Partner Marketing Programs
Tamara Scannell
 
מצגת חשבי שכר-Slide
מצגת חשבי שכר-Slideמצגת חשבי שכר-Slide
מצגת חשבי שכר-Slide
חשבים פלוס
 
Tiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuhTiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuh
ujox
 
stereotypical teenage love story
stereotypical teenage love storystereotypical teenage love story
stereotypical teenage love story
Anya Navaratnam
 
Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016
Comunicatecivi
 
Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...
Climate Change Research Strategy for Primary Industries
 
Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...
Climate Change Research Strategy for Primary Industries
 
Agricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak MallawaarachchiAgricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak Mallawaarachchi
Climate Change Research Strategy for Primary Industries
 

Viewers also liked (20)

eBrochure_Design Services
eBrochure_Design ServiceseBrochure_Design Services
eBrochure_Design Services
 
Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012Cinegif Campaign Report: May-September 2012
Cinegif Campaign Report: May-September 2012
 
Sonus Q4 2012 Report
Sonus Q4 2012 ReportSonus Q4 2012 Report
Sonus Q4 2012 Report
 
Sonus Q3 2012 Report
Sonus Q3 2012 ReportSonus Q3 2012 Report
Sonus Q3 2012 Report
 
Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012Pure Devices Campaign Report: May-September 2012
Pure Devices Campaign Report: May-September 2012
 
BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012BreathResearch Campaign Report: May-September 2012
BreathResearch Campaign Report: May-September 2012
 
Photo album
Photo albumPhoto album
Photo album
 
Hospital software
Hospital softwareHospital software
Hospital software
 
מצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפהמצגת הסבר העסקה עקיפה
מצגת הסבר העסקה עקיפה
 
Los simpsons y futurama
Los simpsons y futuramaLos simpsons y futurama
Los simpsons y futurama
 
You zakelijke portretten vslideshare
You zakelijke portretten vslideshareYou zakelijke portretten vslideshare
You zakelijke portretten vslideshare
 
Essentials of Open Source Documentation
Essentials of Open Source DocumentationEssentials of Open Source Documentation
Essentials of Open Source Documentation
 
How To Approach Partner Marketing Programs
How To Approach Partner Marketing ProgramsHow To Approach Partner Marketing Programs
How To Approach Partner Marketing Programs
 
מצגת חשבי שכר-Slide
מצגת חשבי שכר-Slideמצגת חשבי שכר-Slide
מצגת חשבי שכר-Slide
 
Tiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuhTiga rahasia gereja untuk bertumbuh
Tiga rahasia gereja untuk bertumbuh
 
stereotypical teenage love story
stereotypical teenage love storystereotypical teenage love story
stereotypical teenage love story
 
Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016Agenda Eventi Cividale del Friuli - Gennaio 2016
Agenda Eventi Cividale del Friuli - Gennaio 2016
 
Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...Can flexibility be built into cropping systems for adapting to climate uncert...
Can flexibility be built into cropping systems for adapting to climate uncert...
 
Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...Grains best management practice for managing climate threats and opportunitie...
Grains best management practice for managing climate threats and opportunitie...
 
Agricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak MallawaarachchiAgricultural adaptation during times of change - Thilak Mallawaarachchi
Agricultural adaptation during times of change - Thilak Mallawaarachchi
 

Similar to CNT Q3 2012 Report

William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
centralohioissa
 
Enabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service AnalyticsEnabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service Analytics
Precisely
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
Andreas M. Oswald
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
DevOps.com
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
Kenny Chia Wei Hao
 
M&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINALM&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINAL
Tamerlan Aliev
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
Lilminow
 
The Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple SourcesThe Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple Sources
Inside Analysis
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
Cisco
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
Jaime Cajigas ☁
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
Mighty Guides, Inc.
 
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timePol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Quadrant Communications
 
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
DataStax
 
Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A
Paula Wang
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective:
njain_seanet
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
Sutedjo Tjahjadi
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Michael Brito | Zeno Group
 

Similar to CNT Q3 2012 Report (20)

William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
Enabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service AnalyticsEnabling a Culture of Self-Service Analytics
Enabling a Culture of Self-Service Analytics
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
CyberArk Stock Pitch
CyberArk Stock PitchCyberArk Stock Pitch
CyberArk Stock Pitch
 
M&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINALM&A Presentation Cisco Version FINAL
M&A Presentation Cisco Version FINAL
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
The Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple SourcesThe Strategic Vision: Visualizing Data From Multiple Sources
The Strategic Vision: Visualizing Data From Multiple Sources
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation2019 July SoftwareONE Sales presentation
2019 July SoftwareONE Sales presentation
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timePol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and time
 
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
Webinar: Building a Multi-Cloud Strategy with Data Autonomy featuring 451 Res...
 
Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A Deliver Value to Empowered B2B Customers for Japan TFM&A
Deliver Value to Empowered B2B Customers for Japan TFM&A
 
Cisco - A CIO Perspective:
Cisco - A CIO Perspective: Cisco - A CIO Perspective:
Cisco - A CIO Perspective:
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
Audience Intelligence: Using Social Data to Inform Content, Paid Media and In...
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 

CNT Q3 2012 Report

  • 1. Cal Net Technology Group|Q3 Report QUARTER 3 REPORT JULY – SEPTEMBER 2012 PREPARED BY: talkTECH Communications, LLC
  • 2. Key Data Q3 • Managed and garnered over 524 Twitter followers for @ZSchuler with a reach of64,683during the quarter • Managed and garnered over 764 Twitter followers for @CalNetTechLuca with a reach of 71,071 during the quarter • Managed and generated over 500 LinkedIn connections for Zack • Drafted, posted and seeded 8 blog posts • Garnered 3 feature media placements • Currently drafting Roberts Container case study • Currently drafting CNEPG news release • Created and pitched 1 infographic (IT Security Trends & Facts) • Drafted and pitched 1 byline article (Improvements for Windows 8 on PC – pending placement on IT Jungle) • Drafted 2 news releases: over 2,885 news release views
  • 3. Twitter Analytics @zschuler - Reach 97/01-9/25) 7000 6000 5000 4000 3000 count 2000 1000 0 Total: 64,683
  • 4. Twitter Analytics @CalNetTechLuca - Reach (7/01-9/24) 4500 4000 3500 3000 2500 2000 count 1500 1000 500 0 Total: 71,071
  • 7. News Release News Releases and Top Placements: Cal Net Technology Group Announces Enterprise-Level Information Security Practice Options for SMBs CLICK HERE TO VIEW Cal Net Technology Group Announces Company Growth With New Hires and Notable Awards CLICK HERE TO VIEW
  • 8. Thank you! CONFIDENTIALITY NOTICE: This document contains confidential and privileged information intended only for the individual(s) or entity to which it has been proposed. You are hereby notified that any dissemination, distribution, or copying of this information is STRICTLY PROHIBITED.