CONTENT ANALYSIS (Quantitative Research Methods)Libcorpio
Content Analysis, Quantitative Research Methods, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science, Library Research Methods,
CONTENT ANALYSIS (Quantitative Research Methods)Libcorpio
Content Analysis, Quantitative Research Methods, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science, Library Research Methods,
How to Make your Research Process more Effective? 4 Must-Use Tools for Resear...ResearchLeap
Try a New Method for your Research: Research Tools for Primary and Secondary Research.
Who is this guide for?
If you are about to start writing an academic paper or have already started writing it, this Presentation is for you!
Even if you have already finished writing your paper and published it, this presentation is helpful for you to increase your knowledge and experience in the usage of other tools that you have not used before.
What will you learn?
- The fastest way to source and browse key literature
- How to collect data quickly and painlessly
- Where to find up-to-date data for your statistical research
- Where to submit or publish your research papers
- Where to network with other researchers, professors, and Ph.D. students
WHAT WILL BE COVERED IN THIS PRESENTATION?
- Search Engines
- Reliable Statistical Databases
- Reliable Article Sources (Publishers)
- Networks
Secondary (Theoretical) Research - WHAT
IS IT?
It is a non-empirical approach to research that usually involves perusal of mostly published works like researching through archives of public libraries, courtrooms and published academic journals.
Toolkit of Resources – Every researcher should use
Our goal here at Research Leap is to increase the productivity of researchers. We build manuals that make it easier to organize and write academic papers. We’ve often wondered what else we can do to help researchers work smarter and be more productive. The answer, we found, is surprisingly simple. It’s all about choosing the right tools.
Learn more at http://researchleap.com/toolkit-resources-every-researcher-use/
Journal articles are critically important research products that share new knowledge with the research community, both locally and internationally. However, writing journal articles can be a daunting task for both students and faculty. This presentation shares an approach to writing scholarly academic papers that use a standard and formal structure. The presentation places emphasis on delivering value to the selected target audience with clarity and conciseness.
The strategy of enhancing article citation and H-index on SINTA to improve te...TELKOMNIKA JOURNAL
Development of technology as it is today, most students or lecturers in education community write documents or articles digitally. However, there are still many obstacles when searching for a legitimate source of reference and to know whether it contains plagiarism or not. Until present, there are still many students and lecturers who seek references from sources that have not been valid and not yet trusted, but it is considered a fatal mistake for writing articles and also writing thesis or dissertation from untrusted resources. Therefore, Google Scholar system helps to alleviate this problem. Google also facilitates the use of citations or references. The purpose of this research is to identify the number of citation H-Index owned by lecturers at tertiary education and score ranking achieved at tertiary education SINTA (Science and Technology Index) Ristekdikti. Citing an article from another publication is one form of scientific communication by the author or researcher. The large number of citations obtained from an article published in the publication indicates how significant the contributions of the author in improving the quality of the study field. In this study, citation analysis is used as an analysis of all citations which indicate the type of information sources used by students and lecturers in writing the journal as a result of their research. The following research use two methods of analysis: Mind Mapping methods and SWOT Analysis. After conducting research and executing the research strategy, it will result in improving the reputation by increasing the number of citation and lecturer H-Index at Google Scholar which can automatically also increase the affiliations of authors at tertiary education in Google Scholar. Lecturers who have already verified authors in SINTA (Science and Technology Index) Ristekdikti can contribute in improving the rank and number of tertiary education scores on Ristekdikti Science and Technology Index (SINTA). This research produces a comprehensive and straightforward mathematical formula that can be used in understanding SINTA index calculation which will hence improve the enthusiasm of education community in pursuing research as a team as well as individually. Hopefully, with this research, students and lecturers are able to increase their citation and H-index on articles in publications so as to contribute in improving the reputation and quality of universities in the countries.
This presentation will discuss the following items:
-WHAT DO YOU DO BEFORE WRITING?
- PAPER CONTENTS
- THE FOUR-PART ABSTRACT MODEL
- INTRODUCTION STRUCTURE
-
There is no straight formula to determine the best journal to publish your manuscript. However, analyzing various parameters may help you to decide the journal that best suits you for publishing. Following are some of those criteria:
https://www.cognibrain.com/criteria-for-selecting-journal-for-publication/
How to Make your Research Process more Effective? 4 Must-Use Tools for Resear...ResearchLeap
Try a New Method for your Research: Research Tools for Primary and Secondary Research.
Who is this guide for?
If you are about to start writing an academic paper or have already started writing it, this Presentation is for you!
Even if you have already finished writing your paper and published it, this presentation is helpful for you to increase your knowledge and experience in the usage of other tools that you have not used before.
What will you learn?
- The fastest way to source and browse key literature
- How to collect data quickly and painlessly
- Where to find up-to-date data for your statistical research
- Where to submit or publish your research papers
- Where to network with other researchers, professors, and Ph.D. students
WHAT WILL BE COVERED IN THIS PRESENTATION?
- Search Engines
- Reliable Statistical Databases
- Reliable Article Sources (Publishers)
- Networks
Secondary (Theoretical) Research - WHAT
IS IT?
It is a non-empirical approach to research that usually involves perusal of mostly published works like researching through archives of public libraries, courtrooms and published academic journals.
Toolkit of Resources – Every researcher should use
Our goal here at Research Leap is to increase the productivity of researchers. We build manuals that make it easier to organize and write academic papers. We’ve often wondered what else we can do to help researchers work smarter and be more productive. The answer, we found, is surprisingly simple. It’s all about choosing the right tools.
Learn more at http://researchleap.com/toolkit-resources-every-researcher-use/
Journal articles are critically important research products that share new knowledge with the research community, both locally and internationally. However, writing journal articles can be a daunting task for both students and faculty. This presentation shares an approach to writing scholarly academic papers that use a standard and formal structure. The presentation places emphasis on delivering value to the selected target audience with clarity and conciseness.
The strategy of enhancing article citation and H-index on SINTA to improve te...TELKOMNIKA JOURNAL
Development of technology as it is today, most students or lecturers in education community write documents or articles digitally. However, there are still many obstacles when searching for a legitimate source of reference and to know whether it contains plagiarism or not. Until present, there are still many students and lecturers who seek references from sources that have not been valid and not yet trusted, but it is considered a fatal mistake for writing articles and also writing thesis or dissertation from untrusted resources. Therefore, Google Scholar system helps to alleviate this problem. Google also facilitates the use of citations or references. The purpose of this research is to identify the number of citation H-Index owned by lecturers at tertiary education and score ranking achieved at tertiary education SINTA (Science and Technology Index) Ristekdikti. Citing an article from another publication is one form of scientific communication by the author or researcher. The large number of citations obtained from an article published in the publication indicates how significant the contributions of the author in improving the quality of the study field. In this study, citation analysis is used as an analysis of all citations which indicate the type of information sources used by students and lecturers in writing the journal as a result of their research. The following research use two methods of analysis: Mind Mapping methods and SWOT Analysis. After conducting research and executing the research strategy, it will result in improving the reputation by increasing the number of citation and lecturer H-Index at Google Scholar which can automatically also increase the affiliations of authors at tertiary education in Google Scholar. Lecturers who have already verified authors in SINTA (Science and Technology Index) Ristekdikti can contribute in improving the rank and number of tertiary education scores on Ristekdikti Science and Technology Index (SINTA). This research produces a comprehensive and straightforward mathematical formula that can be used in understanding SINTA index calculation which will hence improve the enthusiasm of education community in pursuing research as a team as well as individually. Hopefully, with this research, students and lecturers are able to increase their citation and H-index on articles in publications so as to contribute in improving the reputation and quality of universities in the countries.
This presentation will discuss the following items:
-WHAT DO YOU DO BEFORE WRITING?
- PAPER CONTENTS
- THE FOUR-PART ABSTRACT MODEL
- INTRODUCTION STRUCTURE
-
There is no straight formula to determine the best journal to publish your manuscript. However, analyzing various parameters may help you to decide the journal that best suits you for publishing. Following are some of those criteria:
https://www.cognibrain.com/criteria-for-selecting-journal-for-publication/
CONTEXTUAL ARCHITECTURE: An Indian PerspectiveSarbjit Bahga
CONTEXTUAL ARCHITECTURE:
An Indian Perspective
CONTEXTUAL ARCHITECTURE: An Indian Perspective is one of the few traveling exhibitions on contemporary architecture in India featuring especially the late 20th and early 21st century architecture. The exhibition is aimed at to document and portray some of the latest additions to the vast treasure of modern building designs in the country. Most of the projects included in it have been unearthed and shown for the first time. What makes the exhibition special is that it includes a variety of projects which are:
• Located in the remote rural settings to the metropolitan cities.
• Smallest to the biggest in size and scale.
• Designed for different climate zones.
• Designed for various cultures and types of people.
• Incorporate various construction techniques and materials.
• Fulfill various functions.
Observation Method is one of the methods for data collection. This method is very much applicable for ethnic research. Expert data collectors are essential to collect data through observation method..
The web is probably too large already, and getting larger. Merging small sites is an opportunity to improve navigation efficiency and ongoing content quality - good for site users and site owners.
See related White Paper: http://slidesha.re/japR3W
Scoping Level of Effort and Getting the Right Resources for the JobJason Kaufman
In this session, you will learn proven methods used for scoping the level of effort involved in achieving successful content project outcomes. You will also learn how to leverage this data to strengthen the case for the resources needed to successfully deliver on project goals.
Making IA Real: Planning an Information Architecture StrategyChiara Fox Ogan
Presented at Internet Librarian conference in 2001. Provides an introduction to what information architecture is and how you can use the methods to develop a good website.
Semantic search helps business people find answers to pressing questions by wading through oceans of information to find nuggets of meaningful information. In this presentation we’ll discuss how semantic search and content analysis technologies are starting to appear in the marketplace today. We’ll provide a recap of what semantic search is and what the key benefits are, then we’ll answer the following questions:
• Is semantic search a feature, an application, or enterprise system?
• How can I add semantic search to my existing work processes?
• Will I need to replace my existing content technologies?
• What will I need to do to prepare my content for semantic search?
• Is semantic search just for documents or can I search my data too?
• Can I use semantic search to find information on the internet and other public data sources?
• Are there standards to consider?
Enhance the way people collaborate with documents in SharePoint Haaron Gonzalez
Learn those extra settings we can turn on to enhance the way people collaborate with documents in SharePoint. There is a set of out of the box settings available in a document library that we can configure to provide a friction free experience for document authors and content consumers.
This session provides information on how to best implement a Document Management System within SharePoint. All elements used to create a DMS are explained in detail and best practices are provided as well.
God søk er essentielt for et godt intranett. Likevel investeres det hverken i nødvendig teknologi eller kompetanseutvikling på søk. Resultatet er skremmende: dobbeltarbeid, dårlige beslutninger, forsinkelser og overskridelser, kaste bort ansattes tid på leting etter informasjon, treg respons på marked, konkurrenter osv. Med forholdsvis enkle grep kan du gjøre noe med dette i dag.
- Hjelp - intranettet flyter over av innhold
- Sammenhengen mellom søk, informasjon, arkitektur og hyperkoblinger
- Viktigheten av kontekst
- Hva har tillit å gjøre med søk
- Hva med mobilen og søk
- Eksempler på dårlig och god søk
How do you structure your information systems to enable collaboration? Through careful planning, proper structure, and
aligned technology, serendipity can happen in large scale and massive organizational benefits can be achieved.
Peoplesoft.com Case Study: Enterprise Information ArchitectureChiara Fox Ogan
Presented at the IA Summit 2002. A case study of the PeopleSoft.com integrated information architecture redesign project. Co-presented with Peter Merholz.
My presentation from J.Boye 2011 on enterprise content strategy. I need to change the conversation of CS being editorial focused and take a look at what I see in the enterprise space.
Similar to Content Analysis: Methods and Mentoring (20)
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.