This document provides an agenda and overview for Day 1 of a "Train the Trainers" workshop on using social media. The day focuses on networking and understanding how to work as a network. Activities include introducing participants' networks through sticky notes, mapping networks, and writing blog posts about networks. The goal is for social media trainers to understand how to leverage their networks to support their work and help NGOs. Participants reflect on how to apply what they learned to their own training.
Beyond The Echo Chamber Network Layer SlideshowTracy Van Slyke
The rising popularity of networked communication has begun to overtake and complicate the concept of top-down media structures. In our book Beyond The Echo Chamber, we lay out and analyze the new media infrastructure through the "four layers of networks."
This slideshow illustrates how media outlets must strategically integrate four layers (and a bonus "cycle of engagement" slide) into their planning to shape and distribute coverage for maximum impact.
Technology has changed what it means for learning communities to “be together.” Digital tools are now part of teaching and learning. Jackie Taylor and Nell Eckersley used this PPT in an interactive session to explore how to use a configuration of social media tools like Twitter, Ning, Delicious, discussion lists, blogs, and Wikis to seamlessly sustain communities of practice.
Most everyone has dipped their toe into the social media waters over the past few years, taking a peek at Facebook and Twitter to see what the buzz is all about. But we have learned that using social media tools isn't very difficult, however using them effectively,
particularly for social change, is challenging. Beth Kanter will lead
an interactive keynote the key principles for effective social media use that turns traditional organizations into cost-effective,far-reaching and effective Networked Nonprofits.
Social Media in Learning, Teaching, and Scholarship: 6 Tales of PracticeGeorge Veletsianos
Keynote at the 2013 Teaching & Learning to the Power of Technology Conference at Saskatchewan, Canada.
Abstract: The last ten years have seen dramatic changes in the ways millions of individuals connect, communicate, and network via technology and through social media. Social media have also penetrated the higher education sector, and it has been posited that they have influenced not only the ways students connect with each other, but also the ways scholarship is organized, delivered, enacted, and experienced. In this keynote, I will share six research-based stories describing the integration and use of social media in higher education. These stories paint an intricate picture of the use of social media in education and juxtapose three perspectives: (a) social media use guided by techno-enthusiasm and techno-determinism, (b) social media as tools to question and circumvent traditional elements of scholarly practice, and (c) social media as transformative technology.
Join us as June Holley, Tracey Kunkler and Steve Waddell dive back into sharing the importance of Network Governance and Structures. We'll be learning how networks are experimenting with and co-creating innovative network governanceand structures that are self-organizing, encouraging and supporting the formation of collaborative circles.
Join us for 90 minutes of hands-on virtual practice! June will bring questions and you will be in practice breakout groups. Please plug in your webcams and have earphones ready to roll up your sleeves and practice with us!
Beyond The Echo Chamber Network Layer SlideshowTracy Van Slyke
The rising popularity of networked communication has begun to overtake and complicate the concept of top-down media structures. In our book Beyond The Echo Chamber, we lay out and analyze the new media infrastructure through the "four layers of networks."
This slideshow illustrates how media outlets must strategically integrate four layers (and a bonus "cycle of engagement" slide) into their planning to shape and distribute coverage for maximum impact.
Technology has changed what it means for learning communities to “be together.” Digital tools are now part of teaching and learning. Jackie Taylor and Nell Eckersley used this PPT in an interactive session to explore how to use a configuration of social media tools like Twitter, Ning, Delicious, discussion lists, blogs, and Wikis to seamlessly sustain communities of practice.
Most everyone has dipped their toe into the social media waters over the past few years, taking a peek at Facebook and Twitter to see what the buzz is all about. But we have learned that using social media tools isn't very difficult, however using them effectively,
particularly for social change, is challenging. Beth Kanter will lead
an interactive keynote the key principles for effective social media use that turns traditional organizations into cost-effective,far-reaching and effective Networked Nonprofits.
Social Media in Learning, Teaching, and Scholarship: 6 Tales of PracticeGeorge Veletsianos
Keynote at the 2013 Teaching & Learning to the Power of Technology Conference at Saskatchewan, Canada.
Abstract: The last ten years have seen dramatic changes in the ways millions of individuals connect, communicate, and network via technology and through social media. Social media have also penetrated the higher education sector, and it has been posited that they have influenced not only the ways students connect with each other, but also the ways scholarship is organized, delivered, enacted, and experienced. In this keynote, I will share six research-based stories describing the integration and use of social media in higher education. These stories paint an intricate picture of the use of social media in education and juxtapose three perspectives: (a) social media use guided by techno-enthusiasm and techno-determinism, (b) social media as tools to question and circumvent traditional elements of scholarly practice, and (c) social media as transformative technology.
Join us as June Holley, Tracey Kunkler and Steve Waddell dive back into sharing the importance of Network Governance and Structures. We'll be learning how networks are experimenting with and co-creating innovative network governanceand structures that are self-organizing, encouraging and supporting the formation of collaborative circles.
Join us for 90 minutes of hands-on virtual practice! June will bring questions and you will be in practice breakout groups. Please plug in your webcams and have earphones ready to roll up your sleeves and practice with us!
Reflections on India by Julian and ingridingridrooms
My son and I made this presentation for the sixth graders at his school! We just wanted to introduce India to them. We also wanted to share some info on his school AES in New Delhi.
A couple places to list your music event in vancouverAnyssa Jane
Some websites around town that will assist you to spread the word about your bands next gig in Vancouver. If you aren't in Vancouver, just search your town for similar leads.
Coaching emerged during the postmodern period of the late 20th Century, born of a rapidly changing socio-economic, environment,and nourished by the root,disciplines of psychology, business, sports and adult, education. This publication aims to trace the origin of coaching.
Community management for instructors Langara College 2015Anyssa Jane
This course will assist you to update your professional skills and profiles on social media though instruction about social platforms, profiles and and community building.
This workshop is hands on today between 9:30 to 4 PM at the Langara Campus in Vancouver, British Columbia, Canada.
You will leave with professional looking profiles and the confidence to use them in a safe, productive manner.
The extended goal is to leave instructors with tools to efficiently communicate online in social spaces, expand your influence, improve outreach and connect to similar communities in your profession.
Stress Caused by Social Networking in Organisations Aakriti Agarwal
A project on understanding the problems created by social networking for the different sections of the work force based on their age, seniority with case studies and a detailed survey, and suggesting HR practises to overcome these hurdles.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Pushing the limits of ePRTC: 100ns holdover for 100 days
E-Mediat Day 1
1. Train the TrainersDay 1: Orientation and Networks Networks for Social Media Trainers Beth Kanter, Co-Author, The Networked Nonprofit This project is managed by Institute for International Institute for Education (IIE)Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI)
5. Theme for Day 1: From Me to We The big idea in the book “The Networked Nonprofit” is that NGOs need to work less like single institutions and more like networks to be more effective using social media. The same is true for social media trainers. Using professional networks can help us be more efficient because we don’t need to know everything. Social media tools can help us easily connect with new people who have knowledge, resources, and ideas to share to help with our goals.
8. Model Use of Social Media Document, Deliver, and Share Instruction What are our rules for sharing on social networks during the session? What other ways have you integrated social media into your training work? #emediat
9. Definition: Social Networks Social networks are collections of people and organizations who are connected to each other in different ways through common interests or affiliations.
10. Five Things About Me: Creating A Social Network Based on Our Individual Knowledge Activity
11. Instructions Share five things about you that are important for others to know for this project Write one word per sticky note Include your name and Twitter ID Each country should be represented by one color of sticky notes
12. Each person should introduce themselves to the group and place their sticky notes on the wall
15. The Power of Social Networks We have now created a social network around our shared interests. This is what happens when we use #hashtagson Twitter or other tools. Social networks have different patterns and structures. The glue that holds them together is relationships: connections and reciprocity. If social media trainers or NGOs understand the basic building blocks of social networks and apply to their work, whether training or a campaign that uses social media tools – we will get better results.
16. None 10 or more How many time zones did you travel to get here? How many time zones did you travel to get to Beirut? (None/more than 10)How comfortable are you personally using social media? (very/not at all)How much experience do you have training or coaching NGOs or civil society organizations that have a campaign or cause? (a lot/not at all) (Raise hands if the campaign used social media)How much experience do you have delivering social media trainings? (no experience/a lot of experience)How much experience do you have creating training materials? (no experience (only use as is)/a lot (create my own from scratch)The Networked Nonprofit concept is relevant to NGOs in my country (agree/disagree)Digital activism campaigns need both strategy and tactics (agree/disagree) Activity Human Spectragram
21. Workshop and Coaching Delivery Module 13 days Module 5 Module 2 Module 3 Module 4 Coaching Coaching Coaching Coaching Analyze and Revise Networked NGOTools and Concepts Facebook and Twitter Building Your Network Promoting Your Work Mobiles Presences andCampaigns Content Strategyand ProductionStorytelling Online SiteIn-Country TeamsOthers
25. Network Primer for Social Media Trainers Basic Definitions Network Terms Tools for Mapping and Examples: Low Tech and High Tech Techniques to Strengthen Networks: Network Weaving Presentation
26. Network Primer for Social Media Trainers What: Social networks are collections of people and organizations who are connected to each other in different ways through common interests or affiliations. A network map visualize these connections. Why: If we understand the basic building blocks of social networks, and visually map them, we can leverage them for our work and NGOs can leverage them for their campaigns. We bring in new people and resources and save time.
27. Periphery Cluster Ties Node Basic Building Blocks of Networks Core Hubs or Influencers Source: Working Wikily
28. Tools for Mapping Your Network There is a range -- from simple to complex, free to expensive, and low-tech to high-tech. Best to begin with low tech methods.
29. How NGOs Visualize Their Networks: Activism Strategy National Wildlife Federation Brought together team that is working on advocacy strategy to support a law that encourages children to play outside. Team mapped their 5 “go to people” about this issue Look at connections and strategic value of relationships, gaps
35. Strengthening Your NetworkSocial Capital and Network Weaving Social Capital: The benefit from building relationships with people in your network through trust and reciprocity Network Weaving: A set of skills that help build your network by introducing people together, facilitating conversations, being a bridge, and sharing resources, information, and contacts Social media makes it easy to strengthen networks because it is easy to find or connect with people online.
37. Working As A Network of Social Media Trainers: Map It First! Goal: This exercise will provide an opportunity for each team to map their network to visualize, develop, and weave relationships with others to help them learn how to use social media and make connections for the NGOs they working with. Description: Teams will work together. They will use sticky notes to create their own professional network. We will debrief standing up as group and looking at each team’s map. One person from each team should be prepared to explain the map to the whole group and share insights. Activity
38. Working As A Network of Social Media Trainers: Map It First! Goal: This exercise will provide an opportunity for each team to map their network to visualize, develop, and weave relationships with others to help them learn how to use social media and make connections for the NGOs they working with. Description: Teams will work together. They will use sticky notes to create their own professional network. We will debrief standing up as group and looking at each team’s map. One person from each team should be prepared to explain the map to the whole group and share insights. Activity
39. Working As A Network of Social Media Trainers: Steps Work together with the members of your In-Country Team Brainstorm a list of “go to” people, organizations, online communities, bloggers, Twitter users, or other resources for getting social media advise/answers. Decide on different colors to distinguish between different groups, write the names on the sticky notes Put them on the poster paper on the wall and as a group identify influencers, discuss specific ties and connections. Draw the connections. Use the reflection questions in the handout to generate more insights Activity
43. Laptop Time: Instructions If you haven’t set up your blog, this is the time to do it. Write a blog post about the Network Map exercise. What did you learn? Take a photo of your map(s) and add it to the blog post. If you are on LinkedIn and want to experiment: http://blog.linkedin.com/2011/01/24/linkedin-inmaps/ Read each other posts and leave comments
44. Debrief What extra insight did you gain from blogging about the network exercise? What was it like to incorporate social media tools in the workshop? How might you adapt this exercise into your training for NGOs? What might be some of the challenges? Benefits? Discussion
45. Reflecting and Closing What is clear? What questions do you still have? What is one thing you can put into practice that you learned today? Discussion
46. Reflecting and Closing: Gratitude Circle Each person will give a bead and acknowledge one person in the room for teaching them something today. After you receive your gift, say thank you. Then it is your turn to thank someone in the room. Facilitator will go first Activity Activity
48. Rules for Using This Content Creative Commons Attribution License You are free to use this work as long you attribute the author Beth Kanter and include a link to Wiki: http://emediat.wikispaces.com