Presentation given to high school seniors at Millbury High School, Millbury, MA. Tips on how to build a good social reputation and resume. How to find potential employers, which social networks to be on.
LinkedIn for business connections, profile building, joining groups.
Facebook for reputation building and research.
We discuss Pinterest, YouTube and Twitter and how to Google yourself.
Michelle Fontaine, teacher - speark - manager of Social Media - FBSmarty.
The Social Media Use Policy Group from Salerno Secondary School in Salthill present their final project from their studies of Young Minds Online - a course developed by Digital Training Institute.
Social media and inbound marketing are increasingly important assets for businesses to get found by and engage with potential buyers on the web. Think about the way you find information about products and services – are you watching TV ads? Going through your junk mail? Or are you going to a search engine or a friend? People have gotten better and better at ignoring marketing messages with DVRs, caller ID, and spam filters, and instead go to Google and social networks for answers to their questions. The question for you is: will you be there to answer it.
Presentation given to high school seniors at Millbury High School, Millbury, MA. Tips on how to build a good social reputation and resume. How to find potential employers, which social networks to be on.
LinkedIn for business connections, profile building, joining groups.
Facebook for reputation building and research.
We discuss Pinterest, YouTube and Twitter and how to Google yourself.
Michelle Fontaine, teacher - speark - manager of Social Media - FBSmarty.
The Social Media Use Policy Group from Salerno Secondary School in Salthill present their final project from their studies of Young Minds Online - a course developed by Digital Training Institute.
Social media and inbound marketing are increasingly important assets for businesses to get found by and engage with potential buyers on the web. Think about the way you find information about products and services – are you watching TV ads? Going through your junk mail? Or are you going to a search engine or a friend? People have gotten better and better at ignoring marketing messages with DVRs, caller ID, and spam filters, and instead go to Google and social networks for answers to their questions. The question for you is: will you be there to answer it.
Jumps and Breaks: Reading the Grays of the Rental Market in Naba’a (Beirut)Ayman Jalloul
Presentation of a paper presented at AUB's annual FEA student conference that research informal rental market in Beirut.
Abstract: Due to the high influx of migrant workers and refugees coming recently from Syria, the neighborhood of Nab‘ah (East Beirut) faces today an increasing demand for affordable and temporary rental housing. As a low-income, informal neighborhood with a large housing stock allocated for rental, Nab‘ah has been the logical destination of destitute populations looking for shelter in an increasingly unaffordable city. The vulnerability of the refugee population in terms of its dire need for housing, its lack of political or economic security, and its desire for flexible and transient housing have all created a set of dynamics that are altering how a rental housing market is expected to work.
In order to better evaluate the incidence of the ongoing refugee crisis on the housing market of this neighborhood, the paper addresses the context of Nab‘ah through a macro and micro scale analysis. The paper’s methodology borrows from the conceptual model developed by Guliyani and Talukdar for a multi- dimensional analysis and comparison of living conditions in different informal settlements. This model proposes that the living conditions (and theoretically the value of rental) in any type of informal settlement can be understood as a combination of both macro (i.e. tenure, infrastructure, location and conditions of the neighborhood) and micro factors (e.g. quality of the housing unit). The macro factors were input into a raster-GIS model to establish geographic zones of what would be theoretical variations and thus shades of gray in the rental housing market of Nab‘ah. A rapid sampling was then conducted to select case studies and test these zones on the micro scale to find discrepancy between theory and reality.
The paper concludes that the socioeconomic pressures of forced migration, the absence of a regulating legal framework, and the greed of realtors have led to an inconsistency in rental pricing that contradict the initial prediction that this pricing is tied to locational factors. Moreover, the paper finds that Nab‘ah has become a space of intensive capital extraction at the expense of its other roles as shelter, home, or a neighborhood. This is ultimately leading to an overall decline in the neighborhood that ripples from every deteriorating housing unit to affect Nab‘ah and its immediate context.
Réseaux sociaux et marketing des territoires // Rencontres Marketing / RN2DBeer Bergman
Présentation pour les Rencontres Marketing du Réseau National des Destinations (touristiques), novembre 2013, à Paris.
Focus sur les réseaux sociaux, les acteurs des réseaux, des contenus partagés et partageables.
Deux questions se posent pour moi :
1. Est-ce que les contenus existent s'ils ne sont pas partagés ?
2. Quel héritage voudrait-on laisser si demain son organisme fermait ?
Dans une démarche d’inbound marketing, définir son public cible est une étape essentielle.
Toute la stratégie à élaborer dépend de l’auditoire auquel l’entreprise ou la marque souhaite s’adresser.
Qu'est-ce qu'un schéma d'aménagement et de développementVille de Laval
Qu’est-ce qu’un schéma d’aménagement et de développement? À quoi ça sert? Que contient le schéma d’aménagement d’une ville? Que doit-il respecter? Découvrez le lexique développé par la Ville de Laval pour vous expliquer ce document-clé dans le développement d’une ville. Informez-vous et participez à la démarche : www.RepensonsLaval.ca
Why should you be on Facebook? How do you manage your personal and professional identities? This presentation goes over how (and why) to use Facebook for building your professional brand. The deck includes:
-Getting started on Facebook: the basics of optimizing your profile
-Privacy: the basics
-Social listening on Facebook: Graph Search, FB newswire, trending
-Best practices for professional Facebook use
Introduction to Facebook from Boulder City Librarytech_bclibrary
This presentations covers the basics of setting up and using a Facebook account.
Covered:
What is Facebook?
What can I do on Facebook?
Creating an account
Your Timeline (Profile)
Adding profile and cover pictures
Notifications
Friend Requests
Updating your Status
Adding Pictures
Reading the News Feed
Commenting, Sharing, and Liking
Privacy Settings
Selecting your audience
Ad privacy settings
Helpful Sites
Here's an overview of Facebook. This training includes:
-What is Facebook
-Setting up your profile & settings
-Search, Groups, Pages/Places, & Friends
-Setting up & managing your page
10-17-11 Lunch and learn presentation by Kathy Sipple, Founder/CEO of My Social Media Coach. Sponsored by Business Women United Network, in conjunction with the
This Presentation includes information about some very useful features of Facebook that users might be unaware of. It also includes steps to be followed to get the most of these features.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
4. One!
• 1. Message Private Matters Instead Of Posting
On Wall
• The walls indeed have ears [and eyes], especially so
for the Facebook Wall.
• It’s best to keep these conversations behind closed
doors: in Facebook Messaging.
5. Two!
• 2. Be Mindful Of What You Post
• Your friends come from different backgrounds, jobs,
beliefs and so on. What you might find to be
interesting might be considered offensive by other
friends.
• Think about how a post might be misterpreted.
6. Three!
• 3. Call Rather Than Post Personal News
• Common sense, personal news is best
communicated in person.
• Be it good or bad ones it’s always better to have
some form of genuine communication through voice
tones and body languages
7. Four!
• 4. Reply To Comments Especially If They Are
Questions
• If your friends take the time to write a comment,
make sure you take the time to reply.
• Imagine a real life scenario
8. Five!
• 5. Avoid Posting Comments On Every Post
• It’s no secret. Everyone is checking everyone’s
profiles. But don’t go commenting and liking
everything they do.
• It annoys your friends, friends of friend and will seem
not genuine of you.
9. Bonus!
• Make sure you mind your tone. It’s easy for
someone to think you are being sarcastic when you
are not, or misunderstand you in any other manner
for that matter
• One way to compensate for this is to use emoticons.
A smiley always makes things better !
11. One!
• 1. Make Friend Requests To Strangers
• Don’t add a stranger just to increase your friend list
or to appear popular
• If you have a valid reason, like approaching a crush,
use some sort of introduction or a mutual friend.
Being blunt about it, will leave a very bad impression
12. Two!
• 2. Tag Your Friends In ‘Unglam’ Shots
• Be sensitive about the photos you tag, especially the
awkward photos.
13. Three!
3. Overshare Yourself
• Don’t bombard your friend’s feeds with mundane
posts about yourselves
• Make sure each post has something of worth
14. Four!
4. Vent About Your Work
• There’s still a risk that what you post can reach
people you wouldn’t want it to reach
• Your co-workers and boss are the last people you
want to mess with.
• So, just play safe and leave your venting to
somewhere private.
15.
16. Five!
5. Post Chain Status Updates
• Not posts like chain emails, but posts related to
causes.
• Although the intention is good, but sometimes too
much of a good thing isn’t good.
• When you see your news feed updates filled with the
same status, you get annoyed instead, and you
associate negative emotions to that social cause
17. Bonus!
• Everyone is entitled to state their own opinion on the
free internet, so there’s no need to put anyone down
just because you disagree with them
• Sometimes people criticizing the comments of their
friend’s friend who replied to the post, whom they
don’t even know. It’s embarrassing not only to
yourself, but to your friend as well.
• Keep this in mind in whatever communication we
have online, in Facebook, forums, emails, etc. Don’t
ruin it for everyone.
19. Activity Log
• Your activity log is a list of your posts and activity,
from today back to the very beginning. You’ll also
see stories and photos you’ve been tagged in, as
well as the connections you’ve made – like when
you liked a Page or added someone as a friend.
20.
21. Hiding Yourself From
Search
• Facebook gives you the option of hiding yourself
from its search engine and other search engines
such a Google or Bing.
• You can access these features through the privacy
settings menu [Located under the Gear Icon on the
Top right of the screen]
22.
23. Log In Notifications
• To turn on Login Notifications:
• Go to your Security Settings page ( > Account
Settings > Security)
• Click on the Login Notifications section
• Check the box next to the type of alerts you'd like to
receive and save your changes
• Note: If you want to receive text message alerts,
you'll need to add a mobile number to your account
24. Log In Notifications
• Nexgt time you log in, Facebook will ask you to
register your device and name it
• An email will be sent to confirm the device name.
25. Lists
• Facebook lists are a great way to manage your
experience online.
• Lists can be used with friends. These lists are useful
when posting and on chat.
• You can also create interest lists and subscribe to
other people’s interest lists.
26. Default Lists
• Close Friends: You can add your best friends to this
list to see more of them in your news feed and get
notified each time they post
• Acquaintances: This list is for friends you don’t
need to stay in close touch with. People on your
acquaintances list will rarely show up in your news
feed.
• Restricted: This list is for people you’ve added as a
friend but just don’t want to share with, like your
boss.
27. Other Lists
• Smart lists: are lists that update automatically
based on info you have in common with select
friends, like a school, job or city. And you can
manually edit them.
• Custom lists: You can also create custom lists to
organize friends and create custom privacy settings.
• When working with Lists, your friends will not be
notified of these settings.
28. Custom Lists
• From the Left of you Home Page you can access
your Friend Lists.
• From there you can create lists and later have
customized settings for them
29. Interest Lists
• Go to your Interests page [www.facebook.com/
bookmarks/interests]
• Click Create List.
• Search for the people or Pages you want to add to
your list using the search box at the top of the
screen, or use the categories on the left to browse.
• After you've selected all of the things you want to
include on your list, click next.
• Pick a name for your list.
• Select a privacy setting
• Click Done.
30. Interest Lists
• Note: You don't have to like a Page or subscribe to a
person to add them to your list. Adding things to a
list and subscribing to a list are independent from
liking or subscribing to the Pages and people
featured in the list.
• If you think one of your friends would enjoy seeing
the information featured on one of the lists you've
created or subscribed to, you can share that list with
them. Here's how:
• Go to the list by clicking Home > Interests > More >
click on the name of the list
• Click Share at the top of the page
31. Chat Settings
• You can customize chat by appearing offline to lists.
This can be accessed by pressing the gear icon:
33. Keyboard Shortcuts
• While working in the chat menu, you can navigate
through your conversations by using Keyboard
Shortcuts.
• You can access the menu by clicking on the gear
icon in the full chat window.
36. Unsubscribing
• Do you have this friend that over-shares everything
about themselves?
• If you have that friend you can limit how much they
show on your feed by adding them to the
acquaintance list.
• On the other hand you can go to their profile, click
on the friends tab and uncheck “Show In News
Feed”
• This is reversible and your friend will not know.
38. Download Your Data
The data you download will include:
• Your timeline information (ex: your contact information, interests, groups)
• Content that you and your friends have posted to your timeline
• Photos and videos that you have uploaded to your account
• Your friend list
• Notes you have created
• Events to which you have RSVP’d
• Your sent and received messages
• Any comments that you and your friends have made on your timeline
posts, photos, and other timeline content
39. Download Your Data
• Press the gear in the top right of the screen
• Go to the General tab
• At the bottom left there is a “Download A Copy” link
• Click of “Start My Archive”
40. Download Your Tagged
Photos
• Using PhotoGrabber App you can download all
your tagged photos.
• PhotoGrabber is a free app and is available for Mac
and PC.
41. Download Your Tagged
Photos
• After downloading the application and installing it,
Log In
• You will be asked to allow the give the application
permission to use your data.
44. Over-sharing?
• You may post something you find normal on Facebook, but
then it's linked to your LinkedIn work profile and you've put
your job at risk.
• If you post pictures of your family and couple that with
information like, "my husband is out of town this weekend” then
safety could be at risk. Nobody ever thinks it will happen to
them until it does, so safety first is a good default mode
when using social networking sites
• If you share your address and phone number on a social
networking site, you open yourself up to threats of identity
theft and other personal dangers like burglaries.
• Identity theft also can happen when you post your full birthday
and along with your full family relationships.
45. Controlling Your Apps
• They can they access your information
• Post on your behalf
• Effect other online services you use [Such as Skype,
LinkedIn Profile…]
• App settings can be accessed from clicking on the
Gear Icon at the top right of the screen then going
to: Account Settings and then Apps
47. Download Facebook
Videos
• Go to www.downvids.net
• Copy/Paste the URL of the videos
• Click download
48. Nutshell Email
• A Facebook app that sends email in a newsletter
format with customized updates.
• Applies to other Social Media platforms such as
Twitter and LinkedIn.
49.
50. Facebook Search
• When you type an entry in the Facebook search bar,
it starts suggesting items based on your patterns of
usage
• For example, friends you interact with most appear
first.
• You can access the full search for further filters and
even web searches and posts by friends
51.
52. Time Rabbit
• On average, a person spends 7 hours/day on
Facebook
• Time Rabbit is a Windows App that monitors your
mouse movement, browser activity and keyboard
activity to calculate how long you stay on Facebook
and use it.
53.
54. SelfControl
• Ever found yourself too distracted by Facebook? Or
does Facebook kill your productivity?
• SelfControl app is an application that blocks
Facebook (and other websites you choose) for a
certain period of time.
• SelfControl blocks Facebook on ALL browsers and
will continue working even if you quit it, log out or
even restart your computer.
• www.selfcontrolapp.com