On Monday 26th October 2009 Mark Ellis delivered a workshop at peckham Library in south London on Social Media: Maximising your Impact. The session was organised by the Media Trust as part of the Learning Revolution Festival.
Association of Fundraising Professionals G-09 Session. A social media starting guide to help NFP leaders and fundraisers better understand the functionality of key social media platforms.
An in-house presentation on social media - beginning with looking at organizational and personal branding then moving into the basics of setting up a listening post.
On Monday 26th October 2009 Mark Ellis delivered a workshop at peckham Library in south London on Social Media: Maximising your Impact. The session was organised by the Media Trust as part of the Learning Revolution Festival.
Association of Fundraising Professionals G-09 Session. A social media starting guide to help NFP leaders and fundraisers better understand the functionality of key social media platforms.
An in-house presentation on social media - beginning with looking at organizational and personal branding then moving into the basics of setting up a listening post.
Rough ideas, perspectives and diagrams about the coolest thing since pirate radio. Yes, social media. Enjoy - but do note that this presentation works better when it's presented face to face.
Workshop for Audit Commission staff who are leaving on social media. Covers introduction to social media, how it might be helpful for seeking employment and what you might need to think about as you develop your online profile.
Twitter is all the rage, but is it right for government communications? This session takes you through the basics of Twitter and provides actionable steps to get started, along with real-life examples of government and social change agents using the service.
Using Social Smarts to Engage Students on Social MediaPaul Brown
Originally presented at the University of Delaware in October 2015. This presentation discusses the developmental dimensions of college student engagement with social media and how to engage them online.
#Greek: Social Media and Today's College StudentsPaul Brown
Originally presented at the Fraternity and Sorority Life Summit of the Carolinas. This presentation provides an overview of opportunities and challenges that college students face online.
Leadership Circle - real estate internet marketingaussiehome.com
Presentation by Charlie Gunningham, MD aussiehome.com, to real estate agents, Aug 20th 2009 - how to get your site higher on Google, Google real estate, using facebook and twitter in marketing, other social media
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
Strata Conference
New York
September 23, 2011
http://strataconf.com/stratany2011/public/schedule/detail/21484
http://youtu.be/PKUI9iz0l9g
The first generation of chief privacy officers were typically attorneys, charged with the formulation and enforcement of privacy policies. Times have changed. Given the speed and complexity of technology, the privacy policy is necessary but hardly sufficient. Because we live much of our lives in public, both online and offline, the Internet is transforming the anonymity of our cities into the familiarity of small towns. Privacy is deeply ingrained within the technology that manages this personal data. The products and services driving this transformation must consider privacy from the earliest design sessions.
Today’s engineer CPO, and I’m one, must deeply involve themselves with the technology and product design process to bake-in privacy. This new breed of CPO is comfortable in an engineering scrum, product focus group, reviewing pending regulations, or analyzing A/B test results. They have the historical awareness, frontier spirit, regulatory caution, technical chops, and innovator’s curiosity to work through the toughest data issues. The promise of the engineer CPO is that products, not only safeguard privacy, but compete on it.
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
The growth of social media—online sites driven by the public sharing on personal information with a wide audience—raises new questions related to how individuals manage their privacy and self-presentation. The technical features of sites such as Facebook, Google Plus, and Twitter lower the transaction costs of connecting and interacting with a large and diverse audience. At the same time, they may raise the costs of managing self-presentation across different contexts and ensuring that private information is not shared with unintended audiences.
Discussions related to self-presentation and privacy have featured prominently in the social sciences for more than half a century. For example, Goffman (1959) argued that individuals’ self-presentation varies based on the audience for whom they are performing. Likewise, Altman (1975) viewed privacy not as a static process, but one of dynamic boundary regulation, in which individuals make decisions regarding which pieces of personal information to share with whom, as well as the context in which that information is disclosed.
In online social networking communities, additional social and technical features make the process of managing privacy and self-presentation more complicated. Unlike anonymous forums, where users can create virtual identities not connected to their “real” selves, SNSs are tied to real identities, and because users often share a significant amount of personal information through these sites (Nosko et al., 2010), privacy becomes a critical element to determining both who to connect with and what to disclose. Boyd (2008) characterizes SNSs as
“networked publics,” and describes three features that differentiate them from other publics: invisible audiences, context collapse, and the blurring of public and private. Each of these factors is critical in evaluating how individuals can regulate boundaries and get the most out of their use of these sites.
Context collapse—the flattening of multiple distinct audiences into a homogeneous group—offers benefits and barriers to individuals. The average American adult has 229 Facebook “friends” (Hampton et al., 2011) who comprise a variety of personal and professional contexts. While Facebook enables users to quickly diffuse information across their entire network, communicating with such a diverse set of others through the same channel (e.g., status updates) may become problematic when it prevents individuals from varying their self-presentation for different audiences or when their full audience is unclear.
When facing these challenges, individuals have a number of options. Bernie Hogan (2010) suggests that users employ a “lowest common denominator” approach, whereby only content appropriate for all audiences is shared on the site. On the other hand, users may employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections.
Rough ideas, perspectives and diagrams about the coolest thing since pirate radio. Yes, social media. Enjoy - but do note that this presentation works better when it's presented face to face.
Workshop for Audit Commission staff who are leaving on social media. Covers introduction to social media, how it might be helpful for seeking employment and what you might need to think about as you develop your online profile.
Twitter is all the rage, but is it right for government communications? This session takes you through the basics of Twitter and provides actionable steps to get started, along with real-life examples of government and social change agents using the service.
Using Social Smarts to Engage Students on Social MediaPaul Brown
Originally presented at the University of Delaware in October 2015. This presentation discusses the developmental dimensions of college student engagement with social media and how to engage them online.
#Greek: Social Media and Today's College StudentsPaul Brown
Originally presented at the Fraternity and Sorority Life Summit of the Carolinas. This presentation provides an overview of opportunities and challenges that college students face online.
Leadership Circle - real estate internet marketingaussiehome.com
Presentation by Charlie Gunningham, MD aussiehome.com, to real estate agents, Aug 20th 2009 - how to get your site higher on Google, Google real estate, using facebook and twitter in marketing, other social media
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
Strata Conference
New York
September 23, 2011
http://strataconf.com/stratany2011/public/schedule/detail/21484
http://youtu.be/PKUI9iz0l9g
The first generation of chief privacy officers were typically attorneys, charged with the formulation and enforcement of privacy policies. Times have changed. Given the speed and complexity of technology, the privacy policy is necessary but hardly sufficient. Because we live much of our lives in public, both online and offline, the Internet is transforming the anonymity of our cities into the familiarity of small towns. Privacy is deeply ingrained within the technology that manages this personal data. The products and services driving this transformation must consider privacy from the earliest design sessions.
Today’s engineer CPO, and I’m one, must deeply involve themselves with the technology and product design process to bake-in privacy. This new breed of CPO is comfortable in an engineering scrum, product focus group, reviewing pending regulations, or analyzing A/B test results. They have the historical awareness, frontier spirit, regulatory caution, technical chops, and innovator’s curiosity to work through the toughest data issues. The promise of the engineer CPO is that products, not only safeguard privacy, but compete on it.
Managing Privacy and Context Collapse in the Facebook AgeJessica Vitak
The growth of social media—online sites driven by the public sharing on personal information with a wide audience—raises new questions related to how individuals manage their privacy and self-presentation. The technical features of sites such as Facebook, Google Plus, and Twitter lower the transaction costs of connecting and interacting with a large and diverse audience. At the same time, they may raise the costs of managing self-presentation across different contexts and ensuring that private information is not shared with unintended audiences.
Discussions related to self-presentation and privacy have featured prominently in the social sciences for more than half a century. For example, Goffman (1959) argued that individuals’ self-presentation varies based on the audience for whom they are performing. Likewise, Altman (1975) viewed privacy not as a static process, but one of dynamic boundary regulation, in which individuals make decisions regarding which pieces of personal information to share with whom, as well as the context in which that information is disclosed.
In online social networking communities, additional social and technical features make the process of managing privacy and self-presentation more complicated. Unlike anonymous forums, where users can create virtual identities not connected to their “real” selves, SNSs are tied to real identities, and because users often share a significant amount of personal information through these sites (Nosko et al., 2010), privacy becomes a critical element to determining both who to connect with and what to disclose. Boyd (2008) characterizes SNSs as
“networked publics,” and describes three features that differentiate them from other publics: invisible audiences, context collapse, and the blurring of public and private. Each of these factors is critical in evaluating how individuals can regulate boundaries and get the most out of their use of these sites.
Context collapse—the flattening of multiple distinct audiences into a homogeneous group—offers benefits and barriers to individuals. The average American adult has 229 Facebook “friends” (Hampton et al., 2011) who comprise a variety of personal and professional contexts. While Facebook enables users to quickly diffuse information across their entire network, communicating with such a diverse set of others through the same channel (e.g., status updates) may become problematic when it prevents individuals from varying their self-presentation for different audiences or when their full audience is unclear.
When facing these challenges, individuals have a number of options. Bernie Hogan (2010) suggests that users employ a “lowest common denominator” approach, whereby only content appropriate for all audiences is shared on the site. On the other hand, users may employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections.
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
Presented at CHI 2013
When you share content in an online social network, who is listening? Users have scarce information about who actually sees their content, making their audience seem invisible and difficult to estimate. However, understanding this invisible audience can impact both science and design, since perceived audiences influence content production and self-presentation online. In this paper, we combine survey and large-scale log data to examine how well users’ perceptions of their audience match their actual audience on Facebook. We find that social media users consistently underestimate their audience size for their posts, guessing that their audience is just 27% of its true size. Qualitative coding of survey responses reveals folk theories that attempt to reverse-engineer audience size using feedback and friend count, though none of these approaches are particularly accurate. We analyze audience
logs for 222,000 Facebook users’ posts over the course of one month and find that publicly visible signals — friend count, likes, and comments — vary widely and do not strongly indicate the audience of a single post. Despite the variation, users typically reach 61% of their friends each month. Together, our results begin to reveal the invisible undercurrents of audience attention and behavior in online social networks.
CSJournalism Digital Communication specialists Noah Echols and Clay Duda presentation about transparency vs. anonymity on the Internet at Geekend 2011 in Savannah, Ga.
Novemeber 12, 2011.
Mark Zuckerberg, founder of Facebook, argues for complete transparency (thus accountability) on the Internet. Christopher "Moot" Poole, founder of the image message board 4Chan, argues for the anonymity and the freedom it brings.
Both perspectives affect how we interact and communicate online, and increasingly within the world around us as our culture becomes more and more tech-saturated.
In this presentation Echols and Duda examine each arguments and the respective founder's real-world actions within the historical context of communication and interpersonal studies.
How has context collapse reshaped the way you communicate? Are you aware of the shift?
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
Introduzione al corso per gli studenti delle Lauree Magistrali di Comunicazione Pubblica e Politica e Comunicazione ICT e Media - Università degli Studi di Torino http://goo.gl/B6vE6M
This presentation is about my MSc research relating to the way that multiple groups of acquaintances on social networking sites, such as Facebook, can create environments ripe for context collapse - untailored identity performances to unintended audiences. More info here: http://stefanieduguay.com/?page_id=595
The European (Digital) Library - Overview and OutlookOlaf Janssen
The European Library (www.theeuropeanlibrary.org) is a multilingual portal offering integrated access to the tens of millions of resources (books, magazines, journals...) of 18 national libraries in Europe. It offers free searching and delivers both digital and non-digital objects. It provides a vast virtual collection of mate-rials from all disciplines. The European Library is currently being expanded with the holdings of the national libraries of the 10 EU New Member States. From September 2006 onwards the remaining EU and EFTA na-tional libraries will be connected to TheEuropeanLibrary.org, bringing the total number of participating na-tional libraries to ±35 by the end of 2008.
In the beginning of 2006 the EC expressed support for The European Library to evolve into a much bigger European Digital Library (EDL), including access to the digital collections of other major cultural heritage institutions, such as museums and archives. The EDL is planned to include the holdings of all European na-tional libraries and a minimum of 2M digital works by the end of 2008. By 2010 the EDL needs to have ex-panded to include collections of archives, museums and other libraries, with a minimum of 6M digital works.
The European Library aims to remain a major player in the European cultural heritage field and is already strengthening its cooperation with other relevant key initiatives, such as MACS, DELOS, MICHAEL, BRICKS and MINERVA.
Janssen, O.D. (2006), “The European (Digital) Library - Overview and Outlook”, in: The e-volution of Information Communication Technology in Cultural Heritage, Joint event CIPA/VAST/EG/EuroMed, Project papers, M. Ioannides, D. Arnold, F. Niccolucci, K. Mania (Eds.), EPOCH publication, 2006, pp. 189-193 (and on CD-ROM)
Update on our Wikipedia activities in 2015 - National library & Archives of t...Olaf Janssen
In this presentation the national library (KB) and national archives (NA) of the Netherlands give an update on their main current Wikipedia activities for 2015. Special attention for a project to describe all 1300 Dutch underground newspapers from WW2 on Wikipedia and Wikidata.
This presentation was given during the bi-annual international GLAM-wiki conference, 10-12 april 2015, The Hague, The Netherlands
See also:
* https://nl.wikipedia.org/wiki/nl:Wikipedia:GLAM/Koninklijke_Bibliotheek_en_Nationaal_Archief/Activiteiten2015 (Dutch only)
* https://nl.wikipedia.org/wiki/nl:Wikipedia:Wikiproject/Verzetskranten (Dutch only)
* https://nl.wikimedia.org/wiki/GLAM-WIKI_2015
Is your organic keyword traffic falling into Google’s “not provided” black hole? – You are not alone. In order to keep your SEO a step ahead you need to understand Google’s updates and enhancements and how they affect your SEO campaigns.
In this webcast, Barry Schwartz, Executive Editor of Search Engine Roundtable and Zack Okun, Director of Product Management at Optify explored the impact of Google’s SSL enhancement, which has led to the increased amount of “not provided” organic visit referral data. Using data trends from over 400 websites both speakers shared practical tips on how to manage the effect of the missing keyword information so your SEO campaigns stay moving in the right direction.
Read this presentation and learn:
- What is Google’s SSL enhancement?
- What has changed? And how does the SSL enhancement affect you?
- The rate of increase in “not provided” data over the past year
- What is the best course of action after the enhancement to improve your SEO?
Watch the full webinar here http://www.optify.net/?page_id=40586&preview=true
Personal branding for career advancement.Robin Low
Personal Branding for career advancement and success. Today, it is imperative to develop and communicate your personal brand with the help of social media to create more visibility and opportunities.
Original article from the Flevy business blog can be found here:
http://flevy.com/blog/tethered-to-technology/
Note from the Editor: This article was originally published in the Reading Eagle’s Business Weekly and is re-posted with their permission. It was contributed by Dr. Santo D. Marabella, The Practical Prof(R).
* * * *
Today, The Practical Prof makes a stunning revelation: I suffer from a serious syndrome known as TTT – Tethered To Technology.
Here’s how I know. I currently manage: 9 social media accounts including Twitter, LinkedIn, and multiple Facebook pages or groups; 7 different email accounts – 6 of which are business, and one for community and personal activities; 4 different websites; two laptops, a desktop computer, an iPad, a smartphone and a landline phone with four extensions.
Ridiculous? Yes. Alone? Nope. Sadly, there are many who suffer with me. Let’s look at some consumer data from Civic Science based on about 9000 responses:
• 64% use a smartphone
• 43% own a tablet computer
• 28% own an e-reader
• 52% watch 2 or more hours of TV per day, not so surprising perhaps, but nearly half of those people are multi-tasking with a second screen device – checking email, playing games, sending texts
Plus, the same study reports that 60% of people with technology never (43%) or seldom (a few times per year) (17%) disconnect from their technology. While there seems to be no demographic pattern to who unplugs, children 13-18 and people over 55 are the most likely to disconnect daily.
But, isn’t technology making our lives easier, making communication faster, and the quality of communication better? Perhaps. But, I worry that in a time when we have never had more ways to communicate, we have never been less communicative. Here are some of the drawbacks I see to being tethered to technology.
Social Media & Your Career: Realities?MattYoungquist
Are social media websites now essential for job hunters to master? What\’s the balance between "sizzle" and "substance" in terms of what these new tools offer from a career advancement and job hunting perspective?
This presentation covers basic concepts, various social media platforms, the exponential growth of social media, case studies on how social media has benefited businesses and a detailed road map for building one's social media presence on the web.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
3. digital footprint Internet users are becoming more aware of their digital footprint Most internet users are not concerned about the amount of information available Most do not take steps to limit that information Fully 60% of internet users say they are not worried about how much information is available about them online Majority of online adults (61%) do not feel compelled to limit the amount of information that can be found about them online. 2008 PEW RESEARCH CENTER
4.
5. why should you be concerned? HR departments, recruiters, universities are searching the Internet when you Interact with them. They're looking to: a) validate what your actual resume said b) learn more about you … in a non office environment In effect, every job seeker of the future will be not unlike a political candidate. Hopefully their closets are squeaky clean, and if not, devise strategies to address it. GOOGLE is a very common tool! In essence, your digital footprint is your resume.
6. generation Y , the millennials Gen Y, are major drivers of the next three trends. They are multimedia whizzes who can produce and upload audio and video as easily as their older counterparts type a letter. Fifty percent of them communicate via text-messaging, and most prefer that mode and instant-messaging over e-mail. The ways they communicate and keep in touch with others are inspiring new online ways to connect. Of the Millennials' ubiquitous participation in social-networking sites,
7. social media It is common for Gen Y to use Social Media. - Facebook - Twitter - LinkedIn - MySpace - Blogs - Wikipedia - Online Forums - YouTube - Flickr
15. dynamics of social media (cont) 2. Collapsed Contexts. Connected to this is the collapsing of contexts. In choosing what to say when, we account for both the audience and the context more generally. Social media brings all of these contexts crashing into one another and it's often difficult to figure out what's appropriate, let alone what can be understood. 3. Blurring of Public and Private. Finally, there's the blurring of public and private. These distinctions are normally structured around audience and context with certain places or conversations being "public" or "private." These distinctions are much harder to manage when you have to contend with the shifts in how the environment is organized.
16.
17.
18. Twitter: dmediaacademy Blog: http:// digitalmediaacademy.blogspot.com / Facebook: http://www.facebook.com/digitalmediaacademy Do you know your digital footprint? Are you managing it yet?
Editor's Notes
If you have YES for most of the answers to the above questions, you may be no better than a zombie.
Many people are stuck in where they are. By spending minutes a day to brainstorm and some time on the weekends to blog about your passion and network, you will never know when opportunity knocks on your door and you may get noticed to do something you really like doing. There is always something better out there, you will need to have the drive to want it and stand out from the crowd.
In a nutshell, Social Media is online technologies and practices that people use to share opinions, insights, experiences, and perspectives with each other.
You need to market yourself to gain attention and eventually do what you like doing. Don’t hide your talents, simply share your knowledge and brand yourself as an expert in what you do.