A presentation by Lewis Brown at the National Digital Forum (NDF) Fair Use Forum, 24 November 2009, Soundings Theatre, Te Papa Wellington.
The real challenge for cultural heritage institutions to meet is free use, not fair use or fair dealing.
A presentation by Lewis Brown at the National Digital Forum (NDF) Fair Use Forum, 24 November 2009, Soundings Theatre, Te Papa Wellington.
The real challenge for cultural heritage institutions to meet is free use, not fair use or fair dealing.
How Museums use Niche Networks for Content Marketing, #LikeableU Cultural Art...Susan Halligan
LikeableU panel: how the American Museum of Natural History, the Museum of Modern Art and the Metropolitan Museum of Art use niche social media channels for branding, content marketing and engagement
Ideas for how volunteers at cultural heritage institutions can help, using Tr...Rose Holley
Every cultural heritage institution has a large body of willing volunteers. this presentation gives some ideas for how they can usefully help you, using Trove as a tool. The presentation is Art related and was written for the National Gallery of Australia but is equally applicable to museums, libraries and archives.
Final- Academy of Science, Social Media StrategyEduardo Velado
Ideas on improving Academy of Sciences Social Media Strategy.
Social Media Strategy presentation about Academy of Sciences.
Instructor: Michael Brito
Class: Social Media Marketing
You may have heard that Twitter, Facebook, and other sites like LinkedIn, Tumblr or Pinterest are great tools for getting the library’s message out to your patrons and stakeholders. This is true, but these tools are even more useful and powerful when you think of them as ways to build relationships with members of your community. Learn what each of these tools has to offer and how you can use them to build relationships through social media outreach.
Presentation includes examples of promoting SirsiDynix tools and resources.
Mapping an Ecosystem of Open Images #OER16Theo Kuechel
The quantity of open images available online is growing exponentially. An emerging challenge for the OER community is to identify relationships between sources of images.
The ecosystem of open images is complex. Provenance, openness and issues of quality are all factors to be considered.
This presentation showcases examples from three distinct sources, and discuss the challenges and affordances of each respectively.
Tumblr: a land of memes, cat GIFs, self-indulgent ramblings and…high-quality curated content? Yes, indeed! With mainstream media as well as respected institutions such as museums and national non-profits now on board, Tumblr has become home to an increasingly sophisticated mix of content. Because of the way Tumblr works and its audience, often the unique, hard-to-find, original source material – archival documents, historic photos, artwork – rises to the top and becomes the most shared, with the most loyal fan-base. With this in mind, how can universities and colleges leverage their content – especially original, unique, highly visual or historic content – to their advantage on Tumblr? Based on four years experience curating the highly successful Art Deco Architecture blog (decoarchitecture.tumblr.com), Darling will outline the basics of Tumblr, showcase various colleges and universities who are doing Tumblr right, and how to judge whether the micro-blogging site can be a good fit for an institution’s marketing efforts.
Learning in Art Museums: Engagement With ArtMaria Mortati
Part of a panel at AERA 2013 on Learning in Art Museum. Other panelists were: Betsy DiSalvo, Georgia Tech, Karen Knutson, UPCLOSE at U. Pittsburgh, and Sarah Schultz, Walker Art Center with Palmyre Pierroux as Discussant.
Pokémon Go is an augmented reality mobile app, and the game has launched and grown at phenomenal rates. Pokémon Go is already on more than twice as many phones as Tinder, has twice the engagement rates of Snapchat and Instagram, and already has a higher percentage of daily active users than Twitter.
Businesses with a physical location can stand to make real money leveraging this virtual game that has hordes of people outside playing every day and night.
This presentation outlines the top five social media trends in 2015 along with actionable next steps for brands to take to begin integrating them into their social media strategy. Also included are a few predictions of what's to come in the space.
More Related Content
Similar to Likeable U: How #Museums Use #Niche Networks For Content Marketing
How Museums use Niche Networks for Content Marketing, #LikeableU Cultural Art...Susan Halligan
LikeableU panel: how the American Museum of Natural History, the Museum of Modern Art and the Metropolitan Museum of Art use niche social media channels for branding, content marketing and engagement
Ideas for how volunteers at cultural heritage institutions can help, using Tr...Rose Holley
Every cultural heritage institution has a large body of willing volunteers. this presentation gives some ideas for how they can usefully help you, using Trove as a tool. The presentation is Art related and was written for the National Gallery of Australia but is equally applicable to museums, libraries and archives.
Final- Academy of Science, Social Media StrategyEduardo Velado
Ideas on improving Academy of Sciences Social Media Strategy.
Social Media Strategy presentation about Academy of Sciences.
Instructor: Michael Brito
Class: Social Media Marketing
You may have heard that Twitter, Facebook, and other sites like LinkedIn, Tumblr or Pinterest are great tools for getting the library’s message out to your patrons and stakeholders. This is true, but these tools are even more useful and powerful when you think of them as ways to build relationships with members of your community. Learn what each of these tools has to offer and how you can use them to build relationships through social media outreach.
Presentation includes examples of promoting SirsiDynix tools and resources.
Mapping an Ecosystem of Open Images #OER16Theo Kuechel
The quantity of open images available online is growing exponentially. An emerging challenge for the OER community is to identify relationships between sources of images.
The ecosystem of open images is complex. Provenance, openness and issues of quality are all factors to be considered.
This presentation showcases examples from three distinct sources, and discuss the challenges and affordances of each respectively.
Tumblr: a land of memes, cat GIFs, self-indulgent ramblings and…high-quality curated content? Yes, indeed! With mainstream media as well as respected institutions such as museums and national non-profits now on board, Tumblr has become home to an increasingly sophisticated mix of content. Because of the way Tumblr works and its audience, often the unique, hard-to-find, original source material – archival documents, historic photos, artwork – rises to the top and becomes the most shared, with the most loyal fan-base. With this in mind, how can universities and colleges leverage their content – especially original, unique, highly visual or historic content – to their advantage on Tumblr? Based on four years experience curating the highly successful Art Deco Architecture blog (decoarchitecture.tumblr.com), Darling will outline the basics of Tumblr, showcase various colleges and universities who are doing Tumblr right, and how to judge whether the micro-blogging site can be a good fit for an institution’s marketing efforts.
Learning in Art Museums: Engagement With ArtMaria Mortati
Part of a panel at AERA 2013 on Learning in Art Museum. Other panelists were: Betsy DiSalvo, Georgia Tech, Karen Knutson, UPCLOSE at U. Pittsburgh, and Sarah Schultz, Walker Art Center with Palmyre Pierroux as Discussant.
Pokémon Go is an augmented reality mobile app, and the game has launched and grown at phenomenal rates. Pokémon Go is already on more than twice as many phones as Tinder, has twice the engagement rates of Snapchat and Instagram, and already has a higher percentage of daily active users than Twitter.
Businesses with a physical location can stand to make real money leveraging this virtual game that has hordes of people outside playing every day and night.
This presentation outlines the top five social media trends in 2015 along with actionable next steps for brands to take to begin integrating them into their social media strategy. Also included are a few predictions of what's to come in the space.
There's Life Beyond Facebook: Big Brands On Small NetworksLikeable Media
Since brands across the globe are using Facebook and Twitter regularly, and networks like Pinterest, Vine, and Instagram are all gaining steam, it’s worth looking at brands that act as “early adopters,” those that push forward and hop onto emerging, niche networks. While large networks have the user numbers, smaller networks often have added benefits that can’t be matched. In this can't miss webinar, Carrie Kerpen highlights some examples of big brands benefiting from smaller networks.
Your Guide To Social Advertising For The Holiday SeasonLikeable Media
Tim Bosch, Director of Media Planning and Buying of Likeable Media, discusses the benefits of Facebook Page post ads, conversion tracking, and graph search for discovering new Facebook ad targeting.
This webinar will outline the current state of social advertising, tips on effectively managing your Facebook advertising campaigns, and how ads will help your business to obtain better ROI this holiday season.
8 Ways To Determine If Your Brand Is LikeableLikeable Media
As much as consumers would like to think that they make purchase decisions solely based on hard facts such as price and quality, the truth remains that we live in a world of emotional decision makers—not robots. Consumers base decisions on their personal feelings toward a brand, connections they may have, and ultimately how likeable they find a brand.
If you were asked, "Is your brand likeable?" would you know the answer? Or better yet, would you be able to prove it? In this can't miss webinar, Cara Friedman of Likeable Media identifies what it means to be likeable on social media and begins the conversation of how to measure likeability. Register now and really learn what it means to be likeable.
The Most Likeable Senior Executives OnlineLikeable Media
Did you know that 68% of CEOs have absolutely no social presence? In this can't miss webinar, Carrie Kerpen, CEO of Likeable Media, is recognizing the Senior Executives who understand social media. Learn what it means to be likeable and find out who made our list of The Top 10 Most Likeable Senior Executives Online.
With the rise of social media outlets like Vine, Snapchat and Tumblr, there's a clear evolution toward content that is more and more short-form. Longer videos and blogs are being replaced with six-second clips, short GIFs and 140-character quips.
This 90-minute webinar for those working with social media will discuss how to adapt to the always-changing digital world, with emphasis on a few effective practices for making content shorter and more engaging. It will provide examples of brands that have done so and discuss why they've been so successful.
Build Your Social Strategy in 30 Minutes - WOMM-ULikeable Media
This session was an interactive workshop at WOMM-U focused on building your brand's social media strategy. Through a variety of brainstorming sessions, practicums, and activities, attendees walked away with an actionable plan for your brand's social media complete with KPIs, voice strategy, crisis management, response guidelines, and more. Each participant created a personalized social strategy for their brand. Led by Likeable Media employees Cara Friedman, Project Director, and Frank Emanuele, Account Manager.
The (Im)possible Role of the Social Media ManagerLikeable Media
Your social media team is falling short -- and it's not their fault. It's time to reevaluate your business objectives and SPARK across departments. Learn how to create a Social Media Forum that staffs for success.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Likeable U: How #Museums Use #Niche Networks For Content Marketing
1. How #Museums Use #Niche
Networks For Content Marketing
Likeable U
May 15, 2012
2. Niche (nich): noun, adjective, verb
1. an ornamental recess in a wall or the like, usually
semicircular in plan and arched, as for a statue or other
decorative object.
2. a place or position suitable or appropriate for a person or
thing: to find one's niche in the business world.
3. a distinct segment of a market.
4. Ecology . the position or function of an organism in a
community of plants and animals.
Dictionary.com
3. Niche Small
Pinterest 104M
LinkedIn 86M
Google+ 61M
Tumblr 42M blogs
Foursquare 20M
Flickr 15M
Instagram 15M
Source: Various
5. Why Tumblr?
• An active, passionate community where
sharing is encouraged
• Tumblr loves photos
• AMNH has tons photos taken by our
talented, in-house Photo Studio
• Could we engage with this community and
generate excitement and awareness of the
Museum through great photography?
13. Results
In one year, we’ve:
• Gained over 16k followers
• Seen steady growth each week
• Named one of the “10 Must-Follow Tumblrs for
“Science Lovers” by Mashable
• Featured in Tumblr Spotlight: Science and Museums
• Consistently featured under “official” science tag
14. Find us on:
Twitter @amnh
Facebook facebook.com/naturalhistory
YouTube youtube.com/AMNHorg
Tumblr amnhnyc.tumblr.com
Pinterest pinterest.com/naturalhistory
Ustream ustream.tv/user/AMNH
Google+
45. Why Pinterest?
• A visual platform is suited to visual art
• The network's growth allows us to reach new
audiences
• We have a wealth of content to share
• Allows users to discover more on our website
46. A Thematic Approach
Theme-focused boards allow users to enjoy works of
art from a variety of cultures and time periods without
feeling overwhelmed
48. Selecting Objects by Motif
The Radiant Peacock: Associated with royalty and
symbolizing beauty, immortality and exoticism, the
peacock has long been a favorite motif of artists
49. Novel Ways to Highlight Content
Museum staff were invited to share personal perspectives
on works of art in the 100-episode series Connections.
This program translates beautifully to Pinterest
50. Beyond Images
• Pin videos from YouTube and Vimeo
• Share blog posts and essays—keep it visually
compelling
• Start conversations. Use @[user name] to reach a
specific person
• Take advantage of hashtags
• Use Google Analytics and look into the growing
arsenal of Pinterest-specific tools
• Have fun! Frankly, it's difficult to avoid
51. Find us on:
Facebook facebook.com/metmuseum
Twitter @metmuseum
YouTube youtube.com/metmuseum
Flickr flickr.com/groups/metmuseum
Flickr flickr.com/photos/metmuseum
Foursquare foursquare.com/metmuseum
52. Contact
@srhalligan: Susan Halligan, Halligan Consulting
@vsamra3: Victor Samra, MoMA
@amnh: Jessica Ulrich, American Museum of Natural History
@jennettem: Jennette Mullaney, Metropolitan Museum