This document discusses using data and metrics to tell impactful stories and drive meaningful change. It covers four key lessons: only collect data you will act on, understand how measures create incentives, be careful of "vanity metrics" on the web, and use data to tell a compelling story. The document also describes a group exercise where participants discuss sharing data successfully, and identifies three trends in the social sector: openness through transparency, data as a product, and harnessing mobile connectivity. The overall message is that data should be used strategically to inform actions and decisions that further an organization's mission and create positive impact.
http://www.koozai.com - Learn the techiques that got us featured in high profile media around the globe, and how building strong relationships with key people can be the best link building tactic you've ever tried.
Leveraging Visual Assets for Social Media SuccessMtHoodTerritory
Learn why you should include compelling images in your social media posts, and the best ways to include them to increase reach and engagement in your social media channels.
Van "social media buzzword bingo" naar inhoudStephan Lam
Veel merken op social media hebben iets weg van cabaretiers, die vooral heel gevat uit de hoek willen komen. Het gaat vooral om de snelste en beste grap, de leukste inhaker of het geinigste onderonsje. Influencers kopen we in en we sturen mails vanuit fictieve personen. Laten we eerlijk zijn, onze social mediakanalen zijn vooral plekken geworden waar we aan het zenden zijn. Het is voornamelijk ‘media’ en maar weinig ‘social’.
Authenticiteit, inhakers, influencers, onderonsjes. De buzzwords vliegen je om de oren. Maar we kunnen terug naar de inhoud, door de klant centraal te stellen en de kracht van de medewerkers in te zetten. Waar ‘media’ voornamelijk bij de marketing afdeling ligt, moet het ‘social’-element breder uit de organisatie komen. Dat gaat vaak verder dan online en de grote uitdaging is dit te borgen in de organisatie. In mijn sessie neem ik je graag mee in de aanpak van Microsoft Nederland om dit te bereiken, aan de hand van -goed, nog één buzzword – mijn visie op thought leadership.
This presentation was delivered to the Grand River chapter of the HRPAO and discusses how to leverage social media technology to recruit. We walk through a solid answer to the question of "why use social media", and thenfocuses on recruiting numbers and metrics as well as a bit on the tactics one can follow.
http://www.koozai.com - Learn the techiques that got us featured in high profile media around the globe, and how building strong relationships with key people can be the best link building tactic you've ever tried.
Leveraging Visual Assets for Social Media SuccessMtHoodTerritory
Learn why you should include compelling images in your social media posts, and the best ways to include them to increase reach and engagement in your social media channels.
Van "social media buzzword bingo" naar inhoudStephan Lam
Veel merken op social media hebben iets weg van cabaretiers, die vooral heel gevat uit de hoek willen komen. Het gaat vooral om de snelste en beste grap, de leukste inhaker of het geinigste onderonsje. Influencers kopen we in en we sturen mails vanuit fictieve personen. Laten we eerlijk zijn, onze social mediakanalen zijn vooral plekken geworden waar we aan het zenden zijn. Het is voornamelijk ‘media’ en maar weinig ‘social’.
Authenticiteit, inhakers, influencers, onderonsjes. De buzzwords vliegen je om de oren. Maar we kunnen terug naar de inhoud, door de klant centraal te stellen en de kracht van de medewerkers in te zetten. Waar ‘media’ voornamelijk bij de marketing afdeling ligt, moet het ‘social’-element breder uit de organisatie komen. Dat gaat vaak verder dan online en de grote uitdaging is dit te borgen in de organisatie. In mijn sessie neem ik je graag mee in de aanpak van Microsoft Nederland om dit te bereiken, aan de hand van -goed, nog één buzzword – mijn visie op thought leadership.
This presentation was delivered to the Grand River chapter of the HRPAO and discusses how to leverage social media technology to recruit. We walk through a solid answer to the question of "why use social media", and thenfocuses on recruiting numbers and metrics as well as a bit on the tactics one can follow.
Building Bridges Connecting Social Media and Service LearningNicoleta Dvornicov
This Power Point is to be of service to those in the service learning community to communicate, honor and promote service learning and civic engagement activities. The Power Point focuses on social media concepts and involves nine 9 interactive exercises.
Success by Challenging Assumptions (Part I)LaDonna Coy
Part one of a two part workshop on Creating Success by Challenging Assumptions with Stephanie Nestlerode, Omega Point International, Inc. and LaDonna Coy, Learning for Change, Inc. for the Texas SPF SIG community grantees. All materials are located at http://bit.ly/xQSu9
Making sense of your data doesn't require mountains of data; it requires a systematic approach that leads to actionable insights. But how to get there? This keynote (given at "Predictive Analytics and Business Insights") shows how to extract significant business value from big data with Ask-Measure-Learn, a system that helps you ask the right questions, measure the right data, and then learn from the results. Using this system can help you learn to:
* Focus on business-related questions
* Find measures that have high causation, a low error rate and a low cost
* Create actionable insights by starting with predictions, benchmarks or recommendations
Это краткая история моей работы в Свердловской Областной клинической больнице. Описаны проблемы, из-за которых меня приняли на работу, и решения, которые я смог предложить.
Building Bridges Connecting Social Media and Service LearningNicoleta Dvornicov
This Power Point is to be of service to those in the service learning community to communicate, honor and promote service learning and civic engagement activities. The Power Point focuses on social media concepts and involves nine 9 interactive exercises.
Success by Challenging Assumptions (Part I)LaDonna Coy
Part one of a two part workshop on Creating Success by Challenging Assumptions with Stephanie Nestlerode, Omega Point International, Inc. and LaDonna Coy, Learning for Change, Inc. for the Texas SPF SIG community grantees. All materials are located at http://bit.ly/xQSu9
Making sense of your data doesn't require mountains of data; it requires a systematic approach that leads to actionable insights. But how to get there? This keynote (given at "Predictive Analytics and Business Insights") shows how to extract significant business value from big data with Ask-Measure-Learn, a system that helps you ask the right questions, measure the right data, and then learn from the results. Using this system can help you learn to:
* Focus on business-related questions
* Find measures that have high causation, a low error rate and a low cost
* Create actionable insights by starting with predictions, benchmarks or recommendations
Это краткая история моей работы в Свердловской Областной клинической больнице. Описаны проблемы, из-за которых меня приняли на работу, и решения, которые я смог предложить.
Creating a Positive Professional Presence (ISASA)Cathy Oxley
Teacher librarians are standing on the brink of a fantastic opportunity to make themselves indispensable within their schools. Now is the perfect time to embrace technology, develop a Professional Learning Network, upskill and become leaders in e-learning.
A presentation given at the ACS CINF Meeting in Denver on March 22nd 2015
The authoring of a scientific publication can represent the culmination of many tens if not 100s of hours of data collection and analysis. The authoring and peer-review process itself often represents a major undertaking in terms of assembling the publication and passing through review. Considering the amount of work invested in the production of a scientific article it is therefore quite surprising that authors, post-publication, invest very little effort in communicating the value and potential impact of their article to the community. Social networking has clearly demonstrated the ability to self-market and drive attention. At the same time, the increasing volume of literature (over a million new articles are published every year), requires authors to take on a more direct role in ensuring their work gets read and cited. This requirement may grow with the emergence of a range of metrics at the article level, shifting attention away from where a researcher publishes to the performance of their individual articles. Therefore, a separate platform to facilitate social networking and other discovery tools to communicate the value of published science to the community would be of value. In parallel the possibility to enhance an article by linking to additional information (presentations, videos, blog posts etc) allows for enrichment of the article post-publication, a capability not available via the publishers platform. This presentation will provide a personal overview of the experiences of using the Kudos Platform and how it ultimately benefits my ability to communicate an integrated view of my research to the community.
Presentation to the Northwest chapter of the IAP2 in Bend, OR. An overview of social media. With many thanks - and credits - to the original presentation by Seth Goldstein, Socialmedia.com.
Lecture 5: Mining, Analysis and VisualisationMarieke van Erp
This is the fourth lecture in the Social Web course at the VU University Amsterdam
Visit the website for more information: <a>Social Web 2012</a>
VolunteerMatch Solutions BPN Webinar: Trends & Best Practices in Using Social...VolunteerMatch
July 2012 Best Practice Network Webinar, presented by VolunteerMatch
Session Description:
Social media has emerged as an ideal platform for sharing a company's corporate responsibility story with its stakeholders. It's authentic. It's continuous. It's targeted. It's interactive. But as opportunities to inform, engage and activate stakeholders continue to grow with the changing technology, small businesses in particular can face challenges in adapting. What tools are worth the investment of time? How can compelling CSR content be developed and shared most efficiently, without sacrificing engagement?
Georgetown University's Center for Social Impact Communication (CSIC) recently conducted research on how small businesses are thinking about CSR, social media, and the intersection of the two. Join Julie Dixon, deputy director of CSIC, for an interactive discussion on trends and best practices, as well as recommendations on how smaller organizations can share their compelling stories of community involvement and employee volunteerism in ways that meet their unique limitations on resources, staff and time.
About Our Guest Speaker:
Julie Dixon is the Deputy Director of the Center for Social Impact Communication (CSIC) at Georgetown University, where she manages the day-to-day operations of the center including research, curriculum and partnership development, outreach and communications. She's the author of CSIC's recent publication "Small Business, Big Engagement," a comprehensive set of trends and best practices for small businesses looking to use social media to engage stakeholders in their socially responsible business practices. Follow her work at the center on Twitter at @georgetowncsic.
Social media for researchers: Increase your research competitiveness using We...Xavier Lasauca i Cisa
In this workshop, adressed to P-Sphere project researchers (European Postdoctoral Research Project, Marie S. Curie Actions, Universitat Autònoma de Barcelona, 28th November 2017) I summarised the benefits which can be gained from use of social media (specially blogs, Twitter and other social networks and repositories) to support research activities, and I provided examples of these innovative emerging resources as tools for scientific communication as well as discussed their implications for digital scholarship. Structure of the lecture: Introduction, Altmetrics, It's Europe!, Active listening, Blogging, Microblogging, Networking, Sharing, Health 2.0, Resources, Strategy, The ten commandments, To deepen, Conclusions.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
12. “Would you drive a car whose speedometer was
bolted on after the fact? On the outside of the car?
With the only measurement being the average speed
since your last stop? Based on an end-of-trip poll of
the passengers in the car as to how fast the trip felt?
Oh, and finally, the results of which required an
expert to read and interpret?
Right. I didn't think so.”
Michael Gilbert, The Gilbert Center
32. Instructions for Group Exercise
1. Form groups of 5; sit close
2. Invite one person to be the host
3. Discuss the question and generate insights for 10 mins
while host takes notes
4. Hosts will present highlights from their conversations
during the large group report out.
33. Group Exercise
• Think about an occasion when you were able to
communicate data or findings from your work to a key
audience that helped advance your mission.
• What was the audience and why do you think you
were successful in sharing your story?