My guide is split in to two sections. The first section, the ‘Beginner’s Step by Step Guide’ follows through the process of setting up your account, uploading a photo and your first tweet.
The second section, the ‘Expert Guide’, refers to slightly more complicated functions such as custom backgrounds, Twitter lists, URL shorteners and scheduling tweets. These are the marks of a Twitter-pro.
Throughout the entire guide there are handy ‘Key Tips’, things that Twitter doesn’t tell you but are highly useful to know. These are the things I wish I had known from the beginning when I was setting up my account.
This document provides instructions for learning to juggle with one, two, and then three balls using two hands. It first instructs the reader to practice throwing a single ball between the two hands. Next, it describes holding one ball in each hand and throwing them back and forth between the dominant and subordinate hand. Finally, it instructs holding two balls in the dominant hand and one in the other, and throwing them in sequence between the hands while catching the returning balls.
The document provides guidance on optimizing a LinkedIn profile. It begins with basic instructions on setting up an account and filling out profile information. It then provides more advanced tips, including using groups, status updates, endorsements, recommendations, and networking to establish expertise in one's field. The goal is to make users more visible and active on LinkedIn for opportunities like finding jobs or clients.
The UK housing market is in a period of transition. The decline and stagnation of the last five years is in reverse and we are seeing the definite signs of a recovery.
This housing market update deals with the key indicators of UK housing including the most recent data from Q2 2013.
The document describes several scenarios where children face problems or conflicts and find compromises or solutions. In one scenario, Molly and a friend compromise by taking turns playing and talking. Another scenario describes Johnny feeling lonely but then joining an outdoor game he saw others playing. A third scenario involves Andreas and a girl named Marietta taking turns on the computer and becoming friends.
Add if you have one. Bio: In 160 characters or less, write a short bio
that is friendly, informative and compelling.
Website: Add your website URL. Include your credentials and what you do.
Bio: In 160 characters or less, write a short bio Examples:
that is friendly, informative and compelling. “CPA, advisor, writer. Helping small businesses
Include your credentials and what you do. grow profitably.”
“Tax pro, mom of 3, foodie. Tweeting about
Examples: taxes, travel and cooking.”
“CPA, advisor, writer. Helping small businesses
grow profitably.”
“Tax pro, mom of 3
1) The document discusses the opportunity for technology to improve organizational efficiency and transition economies into a "smart and clean world."
2) It argues that aggregate efficiency has stalled at around 22% for 30 years due to limitations of the Second Industrial Revolution, but that digitizing transport, energy, and communication through technologies like blockchain can help manage resources and increase efficiency.
3) Technologies like precision agriculture, cloud computing, robotics, and autonomous vehicles may allow for "dematerialization" and do more with fewer physical resources through effects like reduced waste and need for transportation/logistics infrastructure.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
This document provides instructions for learning to juggle with one, two, and then three balls using two hands. It first instructs the reader to practice throwing a single ball between the two hands. Next, it describes holding one ball in each hand and throwing them back and forth between the dominant and subordinate hand. Finally, it instructs holding two balls in the dominant hand and one in the other, and throwing them in sequence between the hands while catching the returning balls.
The document provides guidance on optimizing a LinkedIn profile. It begins with basic instructions on setting up an account and filling out profile information. It then provides more advanced tips, including using groups, status updates, endorsements, recommendations, and networking to establish expertise in one's field. The goal is to make users more visible and active on LinkedIn for opportunities like finding jobs or clients.
The UK housing market is in a period of transition. The decline and stagnation of the last five years is in reverse and we are seeing the definite signs of a recovery.
This housing market update deals with the key indicators of UK housing including the most recent data from Q2 2013.
The document describes several scenarios where children face problems or conflicts and find compromises or solutions. In one scenario, Molly and a friend compromise by taking turns playing and talking. Another scenario describes Johnny feeling lonely but then joining an outdoor game he saw others playing. A third scenario involves Andreas and a girl named Marietta taking turns on the computer and becoming friends.
Add if you have one. Bio: In 160 characters or less, write a short bio
that is friendly, informative and compelling.
Website: Add your website URL. Include your credentials and what you do.
Bio: In 160 characters or less, write a short bio Examples:
that is friendly, informative and compelling. “CPA, advisor, writer. Helping small businesses
Include your credentials and what you do. grow profitably.”
“Tax pro, mom of 3, foodie. Tweeting about
Examples: taxes, travel and cooking.”
“CPA, advisor, writer. Helping small businesses
grow profitably.”
“Tax pro, mom of 3
1) The document discusses the opportunity for technology to improve organizational efficiency and transition economies into a "smart and clean world."
2) It argues that aggregate efficiency has stalled at around 22% for 30 years due to limitations of the Second Industrial Revolution, but that digitizing transport, energy, and communication through technologies like blockchain can help manage resources and increase efficiency.
3) Technologies like precision agriculture, cloud computing, robotics, and autonomous vehicles may allow for "dematerialization" and do more with fewer physical resources through effects like reduced waste and need for transportation/logistics infrastructure.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Katy Young's Guide to Twitter. Everything a first time user should know about Twitter.
1. Katy Young’s Guide to... Twitter
Step by step guide followed by advanced techniques guide21/08/13
2. Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
INTRODUCTION
Twitter is a social media platform where users ‘tweet’ content.
It’s culture is open and encourages users to tweet without needing formal
recognition from other users.
3. Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
CONTENTS
Beginner’s Step by Step Guide Page Number
1. Begin by entering your information 5
2. Describe yourself with a photo and bio 6
3. Email confirmation 7
4. The Top Menu 8
5. Choose a background photo 9
6. Follow interesting people 10
7. Tweet 12
8. Retweet, Reply or Favourite 15
Expert’s Guide Page Number
Including images and videos in tweets 19
Direct messages 22
Quote tweets 23
Privacy settings 25
Custom background 26
Lists 28
URL shorteners 31
Scheduling tweets 33
Websites and Blogs 34
4. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
4
This section is designed to help you navigate through the process of creating your
profile.
I advise having this guide open alongside your web browser as you set up your account.
It includes the key tips and facts I wish someone has told me as I was designing my
Twitter profile. I have shared them in this guide to help you avoid any social media
gaffes.
BEGINNER’S STEP BY STEP GUIDE
BEGINNER
5. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
5
. 1. BEGIN BY ENTERING YOUR INFORMATION
KEY TIPS
• Choose a username similar to your
real name.
• It has to be unique.
• It cannot contain spaces.
• Keep your username short. The
maximum is 15 characters.
Twitter will then move to the next step of asking you to ‘follow’ some celebrities to get you started.
Just choose some of the suggested ones at random. You can add more people later.
6. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
6
. 2. DESCRIBE YOURSELF WITH A PHOTO AND BIO
KEY TIPS
• Choose a recognisable,
zoomed in photograph.
• The image should be in JPG,
GiF or PNG format and of
maximum size 700k
• Your bio should be a short,
precise summary of your job,
interests etc. The maximum is
160 characters.
7. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
7
. 3. EMAIL CONFIRMATION
You will need to log in to your email address. Twitter will have sent you an email with a
link you should click on in order to confirm your account.
8. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
8
. 4. THE TOP MENU
Home is your ‘newsfeed’ where everyone you follow’s tweets are displayed.
Connect is like your ‘notifications’. It’s where you can see who’s mentioned you in a tweet, who’s
started following you, any retweets or favourites of your tweets etc. These are called interactions.
Discover suggests people to follow and popular retweets etc.
Me shows your profile page.
9. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
9
. 5. CHOOSE A BACKGROUND PHOTO
KEY TIPS
• Your background photo can be of
anything but remember that the
middle will be obscured by your
profile photo.
• Get creative like these examples
below.
10. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
10
. 6. FOLLOW INTERESTING PEOPLE
To follow someone is to subscribe to their updates. This means that all of their tweets (posts) will
appear in your news feed but they won’t see yours unless they follow you back.
KEY TIPS
• Search for topics or specific people in the
box along the top bar to find users you’re
interested in following.
• Use the ‘Who to Follow’ box on the left
hand side. Once you’ve followed more
people this box will become more suited to
your interests.
Twitter itself says that “Reading tweets and discovering new information... is where you’ll find the
most value on Twitter.” so who you follow matters.
11. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
11
SIDE NOTE:
Once you’ve followed someone you can use their profile to follow more people.
For example, if I am interested in Economics I might follow BBC Economics Editor Stephanie Flanders.
I can then look through her 270 ‘following’ to find more people’s accounts I might be interested in.
KEY TIPS
• A tick by the side of someone’s
name means that their account has
been verified and is not a parody
or fan’s account.
12. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
12
. 7. TWEET
To compose a tweet click on the blue box in the top right hand corner.
There are several types of tweet. The simplest is a post.
KEY TIPS
• Remember each tweet
is limited to a maximum
of 140 characters.
• On a Mac the hash
key is Alt-3
13. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
13
When posting about a topic you can also include a #Hashtag.
This means that when people search for this Hashtag your tweet will appear.
KEY TIPS
• You can hashtag any word or phrase you want to
but remember not to include spaces.
• When lots of users tweet the same hashtag it is
then ‘trending’. Trends are updated immediately
so they show the current ‘hot topics’.
14. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
14
Another way is to ‘tag’ someone in a post. You do this by including @username.
They will get a notification of this.
A mention can either be in the middle of a tweet...
...or at the beginning.
If its at the beginning of the post it is as if you are talking directly to that
person.
15. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
15
. 8. RETWEET, REPLY OR FAVOURITE
You can also respond to other people’s tweets.
One way is to retweet them.
This means their tweet will appear on your profile and all of your followers will also see it.
KEY TIPS
• A retweet is the
strongest form of
compliment.
16. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
16
Another way is to reply to their tweet directly. This is a way to express an opinion about what they
have said.
Your replies will not appear on the other user’s profile page and will only be seen by people who
follow both you and the person you’re replying to.
If you click ‘Expand’ a box appears giving you the option to reply.
KEY TIPS
• A reply is similar to commenting
on someone’s post or writing on
their Facebook wall in response.
17. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
17
A third way is to favourite a tweet. It will then appear in the ‘Favorites’ section of your profile which
can be accessed from the menu on the left hand side.
The user will get a notification (interaction) of your favourite.
KEY TIPS
• A ‘favourite’ is
equivalent to a Facebook
18. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
18
EXPERT’S GUIDE
Once you’ve mastered the basics, here are some more advanced useful Twitter tools.
EXPERT
19. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
19
INCLUDING IMAGES AND VIDEOS IN TWEETS
Images within tweets will appear as a link (pic.twitter.com) which your followers then click on to view
the picture.
Therefore it uses up some of your 140 characters (usually around 22 characters).
You include a photo by composing a tweet and then clicking on the camera icon in the bottom left
corner, which opens up a window to select the photo from the file where it’s saved on your computer.
KEY TIPS
• You can only post one image per
Tweet.
• These images must be in JPG, GiF or
PNG format but they can be
maximum size of 3MB.
20. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
20
For example, this tweet by The Economist contains a website URL followed by an image URL.
Clicking on ‘View photo’ reveals the photo in the tweet.
21. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
21
Uploading videos is slightly more complicated.
It requires you to set up an account on a video uploading service such as YouTube or Vimeo.
Twitter does not let you store videos on their website so you are effectively just including a URL
to where your video is hosted elsewhere on the internet.
Another option is to use YFrog. This site allows you to log in with Twitter and post tweets
including photos and videos directly from there.
You can post videos more easily from a mobile device. Instagram now has a video capability.
Videos posted from Instagram to Twitter will appear in URLs just as an Instragram photo does.
There is also the mobile app Vine that enables you to post short videos up to 6 seconds long to
Twitter.
22. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
22
DIRECT MESSAGES
A direct message is a way to send a user a private message, similar to an email but on Twitter.
Click on the wheel in the top right hand corner, and in the drop down menu select ‘Direct
messages’.
Here you can view your messages and compose new ones.
KEY TIPS
• You can only send direct messages to
people who follow you.
• But you can receive direct messages from
anyone who you have followed.
23. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
23
QUOTE TWEETS
A standard retweet just reposts the original person’s message. However sometimes you
might want to share their message adding your own comment aswell. This is a quote tweet.
On the Twitter mobile app this is very easy to do. When you click on Retweet, an option
appears to Quote Tweet instead.
KEY TIPS
• Quote tweets only work if the original
tweet is fairly short already else you
won’t have any characters left for your
own comment.
24. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
24
On the computer if you want to quote tweet you have to do it manually.
This involves copying and pasting the original tweet into your own ‘new tweet’ blue box.
Then you add your own comment and remember to write “RT @username” so that it’s clear
it is a retweet and not your own content.
25. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
25
PRIVACY SETTINGS
It is possible to set your Twitter account to private. This means that only people who follow you can see
your tweets and in order to follow you people send a request which you can then approve or decline.
You can do this by clicking on the wheel in the top right hand corner and choosing ‘Settings’.
Scroll down on the new screen and you can tick a box to ‘Protect my Tweets’.
26. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
26
CUSTOM BACKGROUND
There are some really good examples of custom backgrounds. Especially as a business, charity or
even a university society this is a great way of personalising your profile, or as a designer of
showcasing your work.
A popular technique is to embed your company info into your background.
One example is Pepsi.
KEY TIPS
• A background picture
should be maximum size
200k and of dimensions
1600px wide by 1200px
tall (in a Google search this
is the 2MP size).
• A simple left hand column
picture should be 200px or
235px wide.
27. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
27
Websites such as twittergallery.com have a selection of custom backgrounds.
There are also websites like freetwitterdesigner.com which allow you to create your own design, say
with your company logo.
Once you’ve decided on a background some applications will let you log in to
Twitter and change it for you straight away.
Otherwise you will have to change it manually. Go to the ‘Settings’ tab.
On the new screen select ‘Design’ from the left hand side menu.
From this page you can upload the photo to set as your custom background.
28. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
28
. LISTS
A twitter list is a group of Twitter users organised by what those people have in common.
You can follow other people’s Twitter lists.
Lists can be found be clicking on a separate tab on the left hand side of a user’s profile.
29. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
29
Once you open a particular list you can then choose to ‘Subscribe’ to it, another button which appears
on the left hand side.
On your profile it will now appear under your ‘Subscribed to’ Lists.
30. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
30
Additionally you can create your own lists. You don’t have to be following someone to add them to
one of your lists.
Lists can be used to organise users you are following, or simply for your own and/or others
reference.
However lists are for reading only. You cannot send tweets only to the users on a list.
KEY TIPS
• Each list can contain up to 5000 people
and each user can have a maximum of
1000 lists.
• Lists can be either public or private.
• A good example of a public list might be
‘Top 50 journalists’.
31. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
31
. URL SHORTENERS
In a tweet you can include a link to a website.
However with only 140 characters some website URLs could use up the whole tweet.
Twitter will automatically shorten any URLs down to 22 characters. (It does this after you’ve hit the
‘Tweet’ button.)
However to shorten them even further use a URL shortener like Bit.ly or Google url shortener, which
usually only takes up around 17 characters.
If you’re going to be posting links often then creating an account on Bitly is good because it allows
you to save URLs.
32. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
32
For example if I wanted to tweet a link to Ricky Gervais’s blog I would copy the website
address.
And paste this into Google’s url shortener.
It then generates a shorter version for you to put in your tweet. This will still be a hyperlink to
your chosen website.
33. CONTENTS
Katy Young’s Guide to... TwitterKaty Young’s Guide to... Twitter
33
. SCHEDULING TWEETS
This is a useful way to keep your Twitter updated without having to be constantly logged in.
SocialOomph, TweetDeck, Buffer App and HootSuite are all free programmes that allow you to schedule
tweets in advance, amongst other functions.
HootSuite allows you to manage multiple feeds at once, connecting up to 5 social media accounts on the
free version. It is also available on Mobile apps too.
You can compose a tweet and then choose a date and time for it to be published.
KEY TIPS
• Schedule tweets each morning so they appear at
regular intervals to keep your profile at the top of
your followers’ feeds.
• You can schedule tweets to appear whilst events
are happening to create a buzz. Include an
agreed Hashtag so that people attending can
tweet about your event too.
• Go for odd times like 4.33pm instead of 4.30 so
the scheduling isn’t as obvious.
34. CONTENTS
Katy Young’s Guide to... Twitter
34
. WEBSITES AND BLOGS
It is important to integrate your website with your Twitter profile.
One way is to add Twitter buttons to your website page. To do this go to the Twitter Resources page
and choose ‘Buttons’: https://twitter.com/about/resources/buttons.
For a blog post you may want readers to share a link to the article, or for a business you may want
people to follow your company Twitter account.
Click through the options and Twitter will produce a code for you to copy and paste into your
website’s HTML.
If you’re using WordPress to blog, the ‘Publicize’ feature means that a tweet will automatically be
sent whenever you release a new blog post.
There is also the ‘Twitter Widget’ which displays a sidebar of your latest tweets.
35. Katy Young’s Guide to... Twitter
35
. WITH THANKS TO...
Alex Mizrahi, Anthony Quintano, Stephanie Flanders, Ellen Degeneres, Barack
Obama, The Economist, David Cameron, Pepsi, Time Out London and Ricky
Gervais for the use of their material for examples.