The document summarizes David Strom's experience in editorial and technology business publishing. It notes the decline of traditional print publishers and their inability to transition to online. It also discusses the shallowness of blogging and how Google is a starting place for many in IT. Social media strategies and long form content are still relevant according to the document.
Social Media Research at Comms Service ProvidersDavid Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Social Media Research at Comms Service ProvidersDavid Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Tools and Strategies for Social BusinessesJD Lasica
A 45-slide presentation to the Girls in Tech Retreat in Santa Cruz, Calif., on Oct. 10, 2009, with sections on 6 steps to social businesses' success, best practices for the social Web, successful and unsuccessful social media campaigns, Twitter, widgets, metrics and the sharing economy.
In this presentation, we look at the technologies that are dominating the world of social media in 2012.
You can view the presentation in full on YouTube: http://www.youtube.com/watch?v=Rcs77Kw1hQ8
This slideshow was part of a Workshop with 25 young people in Eupen, Belgium. Goal of the Workshop was to inform those people about social media in a first part. In the second part these young people had to built a common news-blog. In workgroups they had to write content, turn videos, publish interviews etc.
Building and Sustaining a Community using the Social Weblisbk
Slides for a talk on "Building and Sustaining a Community using the Social Web" given by Brian Kelly, UKOLN at a UCISA SSG Communications Group Conference on "Using Social Media to Communicate" held at Austin Court, Birmingham on 18 January 2012.
See http://www.ukoln.ac.uk/web-focus/events/workshops/ucisa-ssg-2012/
The African Commons Project in collaboration with Sangonet regularly run a 1-day training workshop for South African NGOs, providing an introduction to social media tools and how they can be applied in their work for social good. This is an updated version of the course. More info at http://africancommons.org
Wondering How To Drive Social Media to Your Hybrid Event?
See Tomeeka's presentation on how to use various social media platforms to drive engagement to your hybrid event.
A presentation from War Child Canada exploring the successes of the War Child Challenge (challenge.warchild.ca/) and best practices for not for profits using social media
Tools and Strategies for Social BusinessesJD Lasica
A 45-slide presentation to the Girls in Tech Retreat in Santa Cruz, Calif., on Oct. 10, 2009, with sections on 6 steps to social businesses' success, best practices for the social Web, successful and unsuccessful social media campaigns, Twitter, widgets, metrics and the sharing economy.
In this presentation, we look at the technologies that are dominating the world of social media in 2012.
You can view the presentation in full on YouTube: http://www.youtube.com/watch?v=Rcs77Kw1hQ8
This slideshow was part of a Workshop with 25 young people in Eupen, Belgium. Goal of the Workshop was to inform those people about social media in a first part. In the second part these young people had to built a common news-blog. In workgroups they had to write content, turn videos, publish interviews etc.
Building and Sustaining a Community using the Social Weblisbk
Slides for a talk on "Building and Sustaining a Community using the Social Web" given by Brian Kelly, UKOLN at a UCISA SSG Communications Group Conference on "Using Social Media to Communicate" held at Austin Court, Birmingham on 18 January 2012.
See http://www.ukoln.ac.uk/web-focus/events/workshops/ucisa-ssg-2012/
The African Commons Project in collaboration with Sangonet regularly run a 1-day training workshop for South African NGOs, providing an introduction to social media tools and how they can be applied in their work for social good. This is an updated version of the course. More info at http://africancommons.org
Wondering How To Drive Social Media to Your Hybrid Event?
See Tomeeka's presentation on how to use various social media platforms to drive engagement to your hybrid event.
A presentation from War Child Canada exploring the successes of the War Child Challenge (challenge.warchild.ca/) and best practices for not for profits using social media
Protecting your digital and online privacyDavid Strom
I gave this talk in October 2019 about ways that your digital and online habits can be tracked and what kind of data you inadvertently leak, along with tools that you can use to protect your privacy.
How to market your book in today's social media worldDavid Strom
Self-published authors need to learn how to use various digital tools to help them market their books. This seminar will show you some of the more common and inexpensive ones
This is a talk I gave in St. Louis in April 2018 about how businesses need to understand the Internet of Things and how they can better protect themselves.
How to make your mobile phone safe from hackersDavid Strom
While the news about laptop camera covers can make any of us paranoid, the real cyber threat comes from the computer we all carry in our pockets and purses: our mobile phones. I will describe some of the more dangerous cyber threats that can turn your phone into a recording device and launch pad for hackers, and how you can try to prevent these in your daily life.
Listen to Your Customers: How IT Can Provide Better SupportDavid Strom
For a weibar sponsored by Citrix 11/15.
IT needs to provide the best possible support to its end users. Indeed, treating them as your customers is critical. We’ll cover some of the lessons learned from the best and worst customer-facing organizations to see how IT can make improvements in this area.
There are numerous analytical techniques that can be used to examine Big Data sources. I describe several of the more popular ones in this talk for a Washington University roundtable discussion in July 2015
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
3. Tech B2B Evolution
• Traditional print publishers dying
(CMP/IDG/ZD/TT/Quinn) and can’t retool for
online
• Traditional biz publishers can’t really cover
tech in any depth
• Blogging model is shallow
• Google is go-to starting place for many in IT
• The rise of sponsored andcustom B2B pubs
4. US Army is a content machine!
Total followers: 123,000
Weekly tweets: 118
Total
followers: >1.1 Total
million subscribers:
Weekly users: Total followers: 700 2600 Total Followers: 650
19,000 Weekly videos
posted: 5
12. What do these have in common?
• Laptop bluetooth drivers
• Improvements in packaging
• Images showing how to replace your battery
on Dell.com
• Better quality of laptop speakers
14. Please use the comments to demonstrate your
own ignorance, unfamiliarity with empirical
data, ability to repeat discredited memes,
and lack of respect for scientific knowledge.
Also, be sure to create straw men and argue
against things I have neither said nor even
implied. Any irrelevancies you can mention
will also be appreciated. Lastly, kindly forgo
all civility in your discourse . . . you are, after
all, anonymous.
15. Adrian Holovaty’s definition of
journalism
• Gathering information,
• Distilling that information and
• Presenting it.
Editor's Notes
They are a content machine. Each week they coordinate the posts on their various social media properties and there is plenty of fresh content. Any social media strategy needs to be based on terrific content, and regular infusions of it. They have this one covered, in spades.
Leadership is essential. The Army’s efforts are led by Major Juanita Chang who is the Director, Online and Social Media Division for the past two years in the Army’s Office of the Chief of Public Affairs. Chang is a career soldier who has been in active duty since 1996 and served at one point as a chemical weapons officer before she got into PR. Having someone who came up through the ranks is key, because they can emphasize with the boots on the ground and know the entire Army ecosystem too. When you pick your social media team leader, keep this in mind.
Take a look at some others here:http://socialmediagovernance.com/policies.php#axzz1nOhG6cnjwhat happens when an individual comes to Dell with an existing Twitter account, and how this account is treated when they leave the company.
http://www.youtube.com/watch?v=8iQLkt5CG8IThis is a 4min. video from an Australian government agency about social media policy.
The guidelines are all common sense and not what you would expect from an organization that believes in the chain of command. “If we can trust our soldiers with guns and grenades, why can’t we trust them with Facebook?” This is from an Army handbook that was posted on Slideshare.netKNOW WHAT YOUR AUDIENCE NEEDS!
NOT THIS CORE TECH -- I know in our rush to embrace all that is new we tend to forget about the old, but blogging is still important and can cement the other social media pieces
This was a four page article that got a total of 35k views on 12/28, and was a redo too! It was a fairly geeky report from the F8 developers conference.
All were as the result of various social media feedback on various forums – tightening the feedback loop between Dell and its customers
http://www.ritholtz.com/blog/, Barry Ritholtz, a financial journalist and speaker
While working at the Washington Post, Adrian Holovaty discovered that reporters were keeping a detailed database of soldiers killed in Iraq so that they would know exactly when to run an 'anniversary' story. But all that data was sitting unused the rest of the time. It two weeks to build that data into what is now a public, searchable database called http://apps.washingtonpost.com/national/fallen/Faces of the Fallen
“The biggest misnomer is that you have to be physically present in the room to listen to the social Web,"saysManish Mehta when I was last here to view the command center.
Tracy/Hepburn movie The Desk Set which was made in 1957 and features the two stars who are conflicted about the computerization of a TV station’s research department. Of course, the computer depicted was the size of a room.