The document provides information about a hands-on workshop on using Facebook for business. It outlines the schedule and agenda for the workshop, which will cover introducing Facebook, setting up profiles and pages, promoting pages, and measuring results. Background is given on the workshop presenter Tanya Salcido and her experience in social media and business branding. Tips are provided on how businesses can leverage Facebook to engage customers, drive traffic, and build their brand.
This document provides an overview of social media policies for nonprofits. It begins with statistics on social media usage in the US and discusses why a social media policy is important for nonprofits given the time people spend on social media platforms. It recommends getting employees and volunteers involved by training them on available social media tools and platforms. The document outlines key components of an effective social media policy, including separating organizational and individual voices, engagement guidelines, and addressing legal aspects. It provides examples of policies from organizations like the Red Cross, YMCA, Bread for the World, and others that range from brief to extensive in length. The document emphasizes the importance of a social media policy for nonprofits to guide appropriate use of these platforms.
Compelling story-telling is essential to social success. Stories are memorable, compelling and, of course, sharable. This presentation will review why story telling is critical for brands today, what makes a great storyteller, as well as thoughts on emerging knowledge on behavioural economics. Story telling is helping organizations and brands gain social traction.
My 1/2 hr keynote presentation for the 2013 Ontario Cycle Tourism Forum
Facebook has over 200 million active users who spend over 4 billion minutes on the site daily. While originally dominated by the US college demographic, Facebook's fastest growing demographics are now those aged 35-54 and 55+, who are growing at rates over 190%. Over 70% of Facebook users are now located outside the US, and the site has been translated into over 70 languages. The average Facebook user has 120 friends and spends time sharing content like photos, videos, links and comments. Marketers can leverage Facebook's large audience and targeting options by creating brand pages, running ads, developing apps, and integrating with websites using Facebook Connect.
The document provides an overview of getting started with social media. It discusses creating profiles on Facebook and LinkedIn, building connections with friends/followers, and using these networks to promote a business or brand. Key tips include having clear goals for social profiles, maintaining consistent posting schedules, and leveraging your existing network to find new connections and opportunities for introductions.
The document discusses social media strategies for social enterprises. It provides an overview of Carbon Outreach, a marketing consultancy that works with non-profits. The presentation covers major platforms like Facebook, Twitter, YouTube and LinkedIn. It defines each platform, discusses how to create personal and business profiles, and provides metrics and case studies on running campaigns. Guidelines are given on content creation and community engagement for each channel. The goal is to help social enterprises and non-profits maximize outreach through an integrated social media approach.
Facebook has faced increasing pressure over user privacy issues as it aims to monetize user data. Its business model relies on collecting and sharing user information with advertisers to generate profits. Over time, Facebook has expanded the amount and type of personal data it collects and shares without clear user consent, such as name, photos, likes and relationships. While users initially expected some degree of privacy over their profiles and information, Facebook's privacy policies have changed in ways that give it broader access and use of user data. There remain open questions around users' reasonable expectations of privacy on social networks and online.
The document discusses social media and its impact on businesses and careers. It provides background on popular social media platforms like Facebook, LinkedIn, Twitter, and blogs. It then outlines both benefits and risks of social media use for businesses, such as screening candidates online and monitoring employees' social media activity. The document stresses the importance of companies establishing clear social media policies to address issues like protecting corporate image and confidential information, avoiding discrimination and harassment, and defining appropriate personal use.
The document provides information about a hands-on workshop on using Facebook for business. It outlines the schedule and agenda for the workshop, which will cover introducing Facebook, setting up profiles and pages, promoting pages, and measuring results. Background is given on the workshop presenter Tanya Salcido and her experience in social media and business branding. Tips are provided on how businesses can leverage Facebook to engage customers, drive traffic, and build their brand.
This document provides an overview of social media policies for nonprofits. It begins with statistics on social media usage in the US and discusses why a social media policy is important for nonprofits given the time people spend on social media platforms. It recommends getting employees and volunteers involved by training them on available social media tools and platforms. The document outlines key components of an effective social media policy, including separating organizational and individual voices, engagement guidelines, and addressing legal aspects. It provides examples of policies from organizations like the Red Cross, YMCA, Bread for the World, and others that range from brief to extensive in length. The document emphasizes the importance of a social media policy for nonprofits to guide appropriate use of these platforms.
Compelling story-telling is essential to social success. Stories are memorable, compelling and, of course, sharable. This presentation will review why story telling is critical for brands today, what makes a great storyteller, as well as thoughts on emerging knowledge on behavioural economics. Story telling is helping organizations and brands gain social traction.
My 1/2 hr keynote presentation for the 2013 Ontario Cycle Tourism Forum
Facebook has over 200 million active users who spend over 4 billion minutes on the site daily. While originally dominated by the US college demographic, Facebook's fastest growing demographics are now those aged 35-54 and 55+, who are growing at rates over 190%. Over 70% of Facebook users are now located outside the US, and the site has been translated into over 70 languages. The average Facebook user has 120 friends and spends time sharing content like photos, videos, links and comments. Marketers can leverage Facebook's large audience and targeting options by creating brand pages, running ads, developing apps, and integrating with websites using Facebook Connect.
The document provides an overview of getting started with social media. It discusses creating profiles on Facebook and LinkedIn, building connections with friends/followers, and using these networks to promote a business or brand. Key tips include having clear goals for social profiles, maintaining consistent posting schedules, and leveraging your existing network to find new connections and opportunities for introductions.
The document discusses social media strategies for social enterprises. It provides an overview of Carbon Outreach, a marketing consultancy that works with non-profits. The presentation covers major platforms like Facebook, Twitter, YouTube and LinkedIn. It defines each platform, discusses how to create personal and business profiles, and provides metrics and case studies on running campaigns. Guidelines are given on content creation and community engagement for each channel. The goal is to help social enterprises and non-profits maximize outreach through an integrated social media approach.
Facebook has faced increasing pressure over user privacy issues as it aims to monetize user data. Its business model relies on collecting and sharing user information with advertisers to generate profits. Over time, Facebook has expanded the amount and type of personal data it collects and shares without clear user consent, such as name, photos, likes and relationships. While users initially expected some degree of privacy over their profiles and information, Facebook's privacy policies have changed in ways that give it broader access and use of user data. There remain open questions around users' reasonable expectations of privacy on social networks and online.
The document discusses social media and its impact on businesses and careers. It provides background on popular social media platforms like Facebook, LinkedIn, Twitter, and blogs. It then outlines both benefits and risks of social media use for businesses, such as screening candidates online and monitoring employees' social media activity. The document stresses the importance of companies establishing clear social media policies to address issues like protecting corporate image and confidential information, avoiding discrimination and harassment, and defining appropriate personal use.
Linkedin: Leveraging Your Profile - CVAC - Canadian Virtual Assistant Connect...Dawn Raquel Jensen, EMBA
Social Business Catalyst Dawn Raquel Jensen of Virtual Options Coaching & Training presentin to CVAC - Canadian Virtual Assistant Connection in a June 2012 webinar on Leveraging Your Linkedin Profile for Business
A brief overview of four major social networks (Facebook, Twitter, YouTube and Flickr). Presented to the Lawrence Chamber of Commerce on February 10, 2010.
Facebook has grown tremendously since its founding, now with over 800 million users uploading photos and videos each month. However, it has faced significant privacy and business model issues. Facebook's initial Beacon program that shared user purchase information without consent caused a backlash. While the site provides valuable user data for advertisers, skepticism remains that Facebook can convert high traffic into sustainable revenue streams given user hostility over privacy and the immersive user experience making ads less effective. Facebook continues working to strengthen its privacy policies and identify business opportunities like e-commerce to profit from its massive user base.
Facebook was launched in 2004 by Mark Zuckerberg and is now the dominant social media platform. The presentation reviews key Facebook metrics for personal and business use such as likes, comments, check-ins and their impact on website visits. It outlines how businesses can connect with consumers through targeted ads and discussions best practices and challenges of using Facebook.
This document discusses social media and finding the right social media mix for businesses. It begins by explaining the evolution of the internet and rise of social media. It then discusses opportunities for businesses with social media like brand protection and reaching customers, but also challenges like monitoring conversations and negative feedback. Finally, it dispels common myths about social media and emphasizes the importance of measuring social media effectiveness and integrating it as part of an overall marketing strategy.
The document discusses the rise and use of social media and blogging. It notes that social media allows for easy sharing of consumer generated media online. Blogging emerged as a way for individuals to publish personal content on the web. While blogs were initially simple HTML pages, services like Blogger made it easier to create blogs. Blogs can be used personally, for courses, or more broadly. Challenges include a lack of strong education examples and potential conflicts with closed online classrooms. Overall, blogs empower personal publishing and conversation in a networked environment.
Social Media Education Workshop for AAMGA University WestSandra Masters
1. The document presents an overview of social media delivered by Sandy Masters for an insurance conference. It discusses the history and rise of social media and how it has empowered individuals as content creators.
2. Key social media platforms are examined including Facebook, LinkedIn, and Twitter. Statistics and considerations for using each network professionally are provided.
3. Attendees then participate in an exercise to develop a social media strategy for their organization. Resources for further social media learning are also shared.
Facebook launched new advertising applications called Facebook Ads and Project Beacon that allow businesses to advertise to users and share users' online activities with their Facebook friends. While Facebook claims this will improve advertising and sharing, many argue it invades users' privacy by sharing private purchasing and browsing habits without clear consent. Some users are considering closing their Facebook accounts if Beacon is not made truly optional. The new applications could generate revenue for Facebook but also risk reducing users and trust if privacy concerns are not adequately addressed.
The impact of social media on purchase behaviourRalph Risk
The document discusses research from the Global Web Index on the impact of social media on consumer behavior and purchase decisions. Some key findings include:
- Social media usage is highest in BRIC countries and Germany/UK are most purchase-oriented online
- Motivations for social media usage vary significantly by country and include staying connected with friends/news, entertainment, research
- People's online social connections influence their brand opinions and purchase decisions
- Consumers extensively research products online prior to purchases, with search engines an important information source
Our vision is to create an easy and convenient tool that would help young adults develop long-lasting, meaningful relationships with peace of mind.
http://www.froffr.com
Webjam is a provider of engaging enterprise social media solutions. We help our clients to connect with their employees and customers by providing them with an easy, affordable solution for social publishing and engagement. Our enterprise social media solutions allow you to create your own social intranet, share ideas and insights, and connect your employees.
http://www.webjam.com
Social Media Ctcef Conference 2009 Updatedbrooke.csukas
This document provides an overview of how organizations can leverage social media to increase visibility and fundraising. It discusses optimizing websites, using social networks like Facebook, Twitter, YouTube and Flickr to engage supporters and promote causes. Personal fundraising through social networks is also covered, noting that volunteers often reach fundraising goals by sending donation requests through their online networks. The importance of integrating all digital engagement and measuring results is emphasized.
Presentation given by Todd C. Mason, President of CU Village, on how credit unions can use the social web to better serve and communicate with their members.
Social Media for The Job Seeker - Focus on LinkedInJP Marketing | NE
Social Media Profiles, Why Should They Matter? THINK ME 2.0! No Online presence? Your employability is diminished! You may even be considered 'invisible’! Now that would suk! Here’s a high level view of SOME things you could do to help make you visible!
Social Media Project Presentation (PPT) for NIITNIIT
This presentation discusses the top social media platforms, with a focus on Facebook. It provides statistics showing that Facebook has the most users and is the most effective platform. It describes some of Facebook's key features, such as status updates, photo sharing, and ads. It argues that Facebook will likely remain the number one social media platform for the next three years if it continues to innovate and address issues like security, privacy settings, and fake profiles. The presentation was delivered by Soumen Chakraborty and Kamalkali Maity.
Facebook was founded in 2004 by Mark Zuckerberg as a social networking site for Harvard students. It quickly expanded to other universities and later to high schools and the general public. By 2006 it had over 7.5 million users but faced competition from MySpace which had over 55 million users. Facebook introduced new features like News Feed that caused a user revolt but the issues were addressed. It continued expanding by opening to more schools and countries. Major acquisitions and events included Instagram in 2012, WhatsApp in 2014, and the Cambridge Analytica data breach scandal in 2018. By 2017 Facebook had over 2 billion monthly active users, cementing its position as one of the largest and most popular social media platforms in the world.
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
This presentation gives the legal and business framework for corporations looking to build trust online with their customers. Through partnering with a law firm to craft a custom social media policy, deploy it to staff, and maintain continuous monitoring and litigation support, businesses can more effectively enter the social media space with confidence.
Social Media Policy Essentials for Lenders and BrokersSmarsh
Learn how to adopt and enforce social media policies that make sense for the mortgage industry, including:
-What elements should be included
-Best practices for developing a social media policy
-How to enforce a policy once it's made
Linkedin: Leveraging Your Profile - CVAC - Canadian Virtual Assistant Connect...Dawn Raquel Jensen, EMBA
Social Business Catalyst Dawn Raquel Jensen of Virtual Options Coaching & Training presentin to CVAC - Canadian Virtual Assistant Connection in a June 2012 webinar on Leveraging Your Linkedin Profile for Business
A brief overview of four major social networks (Facebook, Twitter, YouTube and Flickr). Presented to the Lawrence Chamber of Commerce on February 10, 2010.
Facebook has grown tremendously since its founding, now with over 800 million users uploading photos and videos each month. However, it has faced significant privacy and business model issues. Facebook's initial Beacon program that shared user purchase information without consent caused a backlash. While the site provides valuable user data for advertisers, skepticism remains that Facebook can convert high traffic into sustainable revenue streams given user hostility over privacy and the immersive user experience making ads less effective. Facebook continues working to strengthen its privacy policies and identify business opportunities like e-commerce to profit from its massive user base.
Facebook was launched in 2004 by Mark Zuckerberg and is now the dominant social media platform. The presentation reviews key Facebook metrics for personal and business use such as likes, comments, check-ins and their impact on website visits. It outlines how businesses can connect with consumers through targeted ads and discussions best practices and challenges of using Facebook.
This document discusses social media and finding the right social media mix for businesses. It begins by explaining the evolution of the internet and rise of social media. It then discusses opportunities for businesses with social media like brand protection and reaching customers, but also challenges like monitoring conversations and negative feedback. Finally, it dispels common myths about social media and emphasizes the importance of measuring social media effectiveness and integrating it as part of an overall marketing strategy.
The document discusses the rise and use of social media and blogging. It notes that social media allows for easy sharing of consumer generated media online. Blogging emerged as a way for individuals to publish personal content on the web. While blogs were initially simple HTML pages, services like Blogger made it easier to create blogs. Blogs can be used personally, for courses, or more broadly. Challenges include a lack of strong education examples and potential conflicts with closed online classrooms. Overall, blogs empower personal publishing and conversation in a networked environment.
Social Media Education Workshop for AAMGA University WestSandra Masters
1. The document presents an overview of social media delivered by Sandy Masters for an insurance conference. It discusses the history and rise of social media and how it has empowered individuals as content creators.
2. Key social media platforms are examined including Facebook, LinkedIn, and Twitter. Statistics and considerations for using each network professionally are provided.
3. Attendees then participate in an exercise to develop a social media strategy for their organization. Resources for further social media learning are also shared.
Facebook launched new advertising applications called Facebook Ads and Project Beacon that allow businesses to advertise to users and share users' online activities with their Facebook friends. While Facebook claims this will improve advertising and sharing, many argue it invades users' privacy by sharing private purchasing and browsing habits without clear consent. Some users are considering closing their Facebook accounts if Beacon is not made truly optional. The new applications could generate revenue for Facebook but also risk reducing users and trust if privacy concerns are not adequately addressed.
The impact of social media on purchase behaviourRalph Risk
The document discusses research from the Global Web Index on the impact of social media on consumer behavior and purchase decisions. Some key findings include:
- Social media usage is highest in BRIC countries and Germany/UK are most purchase-oriented online
- Motivations for social media usage vary significantly by country and include staying connected with friends/news, entertainment, research
- People's online social connections influence their brand opinions and purchase decisions
- Consumers extensively research products online prior to purchases, with search engines an important information source
Our vision is to create an easy and convenient tool that would help young adults develop long-lasting, meaningful relationships with peace of mind.
http://www.froffr.com
Webjam is a provider of engaging enterprise social media solutions. We help our clients to connect with their employees and customers by providing them with an easy, affordable solution for social publishing and engagement. Our enterprise social media solutions allow you to create your own social intranet, share ideas and insights, and connect your employees.
http://www.webjam.com
Social Media Ctcef Conference 2009 Updatedbrooke.csukas
This document provides an overview of how organizations can leverage social media to increase visibility and fundraising. It discusses optimizing websites, using social networks like Facebook, Twitter, YouTube and Flickr to engage supporters and promote causes. Personal fundraising through social networks is also covered, noting that volunteers often reach fundraising goals by sending donation requests through their online networks. The importance of integrating all digital engagement and measuring results is emphasized.
Presentation given by Todd C. Mason, President of CU Village, on how credit unions can use the social web to better serve and communicate with their members.
Social Media for The Job Seeker - Focus on LinkedInJP Marketing | NE
Social Media Profiles, Why Should They Matter? THINK ME 2.0! No Online presence? Your employability is diminished! You may even be considered 'invisible’! Now that would suk! Here’s a high level view of SOME things you could do to help make you visible!
Social Media Project Presentation (PPT) for NIITNIIT
This presentation discusses the top social media platforms, with a focus on Facebook. It provides statistics showing that Facebook has the most users and is the most effective platform. It describes some of Facebook's key features, such as status updates, photo sharing, and ads. It argues that Facebook will likely remain the number one social media platform for the next three years if it continues to innovate and address issues like security, privacy settings, and fake profiles. The presentation was delivered by Soumen Chakraborty and Kamalkali Maity.
Facebook was founded in 2004 by Mark Zuckerberg as a social networking site for Harvard students. It quickly expanded to other universities and later to high schools and the general public. By 2006 it had over 7.5 million users but faced competition from MySpace which had over 55 million users. Facebook introduced new features like News Feed that caused a user revolt but the issues were addressed. It continued expanding by opening to more schools and countries. Major acquisitions and events included Instagram in 2012, WhatsApp in 2014, and the Cambridge Analytica data breach scandal in 2018. By 2017 Facebook had over 2 billion monthly active users, cementing its position as one of the largest and most popular social media platforms in the world.
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
This presentation gives the legal and business framework for corporations looking to build trust online with their customers. Through partnering with a law firm to craft a custom social media policy, deploy it to staff, and maintain continuous monitoring and litigation support, businesses can more effectively enter the social media space with confidence.
Social Media Policy Essentials for Lenders and BrokersSmarsh
Learn how to adopt and enforce social media policies that make sense for the mortgage industry, including:
-What elements should be included
-Best practices for developing a social media policy
-How to enforce a policy once it's made
The document discusses the emergence and prevalence of social sharing buttons on websites, known as "share widgets". It provides statistics on the widespread use of like and share buttons on Facebook, Twitter, and other social networks. The document also covers the business benefits of share widgets, such as increased customer engagement, sales, and access to user data. Potential future applications and some concerns about overuse of sharing options are presented as well.
This document discusses social media and its potential for enterprise integration. It notes the large number of social media users and how enterprises are increasingly monitoring social media for marketing insights, customer feedback and recruiting. The document proposes that Information Builders' iWay product can help enterprises create a "social CRM" by integrating social media profiles and data into existing CRM systems, and analyzing social data alongside traditional customer information. This would allow improved customer engagement and access to richer customer insights.
This document discusses strategies for social recruiting, particularly targeting college students and Generation Y. It outlines four approaches to recruiting according to a Michigan State University study. It also provides data on how human resources departments are increasing their use of technology and social media for recruiting. The document recommends focusing recruitment efforts on the communities and interests of candidates, leveraging search strategies, and emphasizing peer relationships rather than treating candidates as prospects.
This document discusses signs on the social media road ahead. It identifies three key signs: 1) building audiences through social networks, 2) curating influence by managing influencers and content, and 3) creating layered social experiences across organizational units like sales, marketing, and customer service. The document suggests associations need strategies to engage stakeholders through social media and address how new technologies are changing user behaviors and business models.
Your social media identity consists of photos, videos, text, and content others post about you. It is important to protect your social media identity to prevent identity theft and fraud. Managing your social media identity properly, such as using privacy settings and only connecting with people you know, helps avoid potential damage to personal relationships, reputation, and identity theft. Employers also use social media to screen applicants, so maintaining a positive online profile is important for professional reasons.
This document provides an overview of the benefits and importance of having social media policies for organizations. It discusses how such policies can:
1) Protect employees and the organization from reputational harm or legal issues that may arise from employees' social media use and comments.
2) Guide employees on properly participating in and using social media to connect with others and build relationships in a way that benefits the organization.
3) Outline guiding principles for social media use, such as transparency, maintaining separation between personal and professional accounts, protecting proprietary information, and promoting good digital citizenship.
Facebook is the world's most popular social network with over 1.15 billion users. It was founded in 2004 by Mark Zuckerberg. When people sign up, they often neglect to read the lengthy terms of service. Facebook's terms state that users must provide their real names and information, though verifying identities online is difficult. Facebook applications can access users' personal information once they agree to the terms, and app creators may sell that data. While Facebook allows most types of content, it prohibits hate speech, threats, nudity, and some graphic violence.
This document provides guidance on using social media to help students land internships or jobs. It notes that over half of employers use social media to research candidates and recommends students clean up any unprofessional online content before applying. It also advises students to build an online presence through activities like blogging, tweeting carefully about their industry, and networking on LinkedIn and Facebook in order to showcase their qualifications and personality to potential employers. Students are warned that anything posted online should be considered public and that privacy settings may not fully protect their information from being accessed and shared.
ITS 833 – INFORMATION GOVERNANCEChapter 13 Information Gover.docxvrickens
ITS 833 – INFORMATION GOVERNANCE
Chapter 13 Information Governance for Social Media
Dr. Sandra J. Reeves
[email protected] J. Reeves 2018
1
This chapter deals with Information Governance for Social Media. You see in the lower left corner the logo for the website where I acquired the theme for the Power Point slide. I chose to use more of a “cartoon” view with the two people in the lower right corner getting acquainted for two reasons. First, it is almost comedic the kinds of ridiculous things that people will post on social media sites, and second the cartoon depicts two people “getting acquainted”, which is also what happens often on social media. Going back to the first comment, not only will people make complete and utter fools of themselves on social media, they demonstrate their lack of common sense and reasoning. In addition, some people commit criminal acts and then boast about it on social media. Social media is used frequently in child custody cases to demonstrate when a parent has used such poor judgment that it does not serve in the best interest of their children for them to have custody and control over those children. Having said that, there are appropriate and positive uses for social media.
1
CHAPTER GOALS AND OBJECTIVES
Be able to discuss uses of social medial for business and government
What is Web 2.0? How is it different?
What are some categories of social media platforms? Examples of each
Give examples of tools used to archive social media
What is the difference between static and dynamic social media content
Legally what is required with regard to the capture, storage and archival of social medial content by an organization?
What are the rules for record retention of social media records?
What are the record retention guidelines for social media records?
What is enterprise social media?
What is the difference between an inward vs. outward facing social media site?
What are the ways in which social media is the same and is different from things like e-mail and IM?
What are the advantages and risks of social media in the organization?
List key social medial guidelines that all organizations should follow regardless of industry
What is meant by spoliation of evidence?
Give an overview of the best practices that are evolving for social media records
[email protected] J. Reeves 2018
2
Look at the slide above. These are the highlights from Chapter 14 that I want you to take away from the chapter.
2
Uses for Social Media in the Public and Private Sector
Corporate Use:
Create visible branding
Strengthen relations with customers
Attract new customers
Highlight and advertise their products and services
Collect information used in decision making
[email protected] J. Reeves 2018
3
Government Use:
Consult with and engage citizens
Provide services
Keep pace with fast moving events
Facilitate communication and collaboration
Improve Employee Engagement
Boost productivity and Efficiency
Internal Social Media:
Help ...
Social media and performance managementOntarioEast
The document summarizes an agenda for a conference on social media and performance management. The agenda includes discussions on social media risks and benefits for businesses, performance management of employees, and recent labor law updates. It provides statistics on social media use and discusses best practices for social media policies and monitoring employee social media use while avoiding discrimination. A recent labor board case upholding the firing of employees for insulting Facebook posts about their employer is also summarized.
The document provides an overview of social media websites and tools for economic development professionals. It discusses popular sites like Facebook, LinkedIn, Twitter and how they can be used for business purposes. The document also provides tips on using profiles, analytics and applications on each platform to engage customers and promote organizations. Screenshots and step-by-step instructions are included to help users set up profiles and customize features.
This document provides an agenda for a social media event held by IBM on April 27, 2012. The agenda includes sections on the growth and prevalence of social media, why companies and individuals should be active on social media, how to establish a personal brand on social media, and guidelines for using platforms like Facebook, LinkedIn, and social media in general while representing IBM. Key details are given for how to use different social media features to engage audiences and nurture relationships. Guidelines stress the importance of transparency about one's IBM affiliation and following IBM's business conduct policies when using social media.
This document summarizes the key terms of Facebook's terms of use policies regarding ownership of content, privacy, surveillance, censorship, and freedom of expression. The policies state that content uploaded to Facebook becomes their property, and they can collect data on users from user activity and information shared by others. While privacy settings allow some control, Facebook retains the right to make some content public. The extensive data collection raises privacy concerns. The policies also give Facebook the ability to censor content and limit expression, though this aims to create a safe environment for users. Overall, the terms highlight tensions between Facebook's business interests and users' control over personal information and expression.
Facebook and LinkedIn are two major social media platforms important for businesses. Facebook has over 955 million active users and is a global communication channel that businesses need a presence on, though they must carefully plan their interactions to respect how people typically use Facebook. LinkedIn is a social media site focused on professional networking. The document provides guidance on setting up business pages and profiles on each platform to engage customers and build communities.
Similar to Policy Primer: Facebook Pages Terms (20)
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...AlexanderRichford
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation Functions to Prevent Interaction with Malicious QR Codes.
Aim of the Study: The goal of this research was to develop a robust hybrid approach for identifying malicious and insecure URLs derived from QR codes, ensuring safe interactions.
This is achieved through:
Machine Learning Model: Predicts the likelihood of a URL being malicious.
Security Validation Functions: Ensures the derived URL has a valid certificate and proper URL format.
This innovative blend of technology aims to enhance cybersecurity measures and protect users from potential threats hidden within QR codes 🖥 🔒
This study was my first introduction to using ML which has shown me the immense potential of ML in creating more secure digital environments!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Ukraine
Під час доповіді відповімо на питання, навіщо потрібно підвищувати продуктивність аплікації і які є найефективніші способи для цього. А також поговоримо про те, що таке кеш, які його види бувають та, основне — як знайти performance bottleneck?
Відео та деталі заходу: https://bit.ly/45tILxj
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
4. In fact, if you
already have a
Page, you’ve
{
already
agreed to this
contract and
you may not
be aware of it.
Image source: Smith, M (2009)
5. Pages Terms works in conjunction with other
guidelines and are for businesses, both big and small.
• Pages Terms
}
When you create or • Statement of Rights &
administer a Facebook Responsibilities
business Page, you’ll • Data Use Policy
need to become familiar
with these guidelines: • Community Standards
• Advertising Guidelines
• Facebook Platform
Policies
Image source: Facebook (2012)
6. Failure to comply, may result in your
page being shut down by Facebook
head quarters. (Facebook, 2012)
Image source: Software Latest Releases, 2010.
7. Pages Terms
{
Page legitimacy and use;
}
In essence,
Policy compliance with the Terms of Use;
Pages Terms set
Community Standards for content;
guidelines on:
Collection of data;
Advertising, applications, offers and
promotions;
Your cover image and its content.
(Facebook, 2012)
8. Pages Terms
I. General – Page legitimacy
{pretend to be
Don’t
someone you’re not.
You must be an authorised person
to administer a business Page.
You can create a Page to express
support for a brand but don’t
confuse people for who you really
are.
Image source: Wagner, E (2012) (Facebook, 2012)
9. Pages Terms
I. General – Ad Guidelines & Community Standards
Those We all have standards.
words
aren’t cool.
{
Disrespectful or hurtful content on your
page is not ethical or appropriate.
Illegal activity
Harassment
Hate speech This
includes
Targeting to minors posts by
Sex/nudity your users!
Shock value
This content may cause your page to be taken
down or you may get a call from the
Advertising Standards Bureau.
Image source: Management Today (2012) (Facebook, 2012; and mUmbrella, 2012)
10. Pages Terms
II. Page Management – Collection of Data
{
Be transparent and take
responsibility for users’ privacy.
There are rules about how you collect users’
data and Facebook wants you to be upfront
and take full accountability for the reuse of
personal information and users’ privacy.
Image source: Uniglobe (n.d.) (Facebook, 2012)
11. Pages Terms
III. Page Features
{
Watch
your
Cover!
It’s not all
about you.
Your cover image can’t be used as a form of advertising or be misleading.
So NO calls to action, purchase information or contact details.
(Facebook, 2012) Image source: fb Cover Lover (2012)
12. What not to do
for your Cover
Image source: hy.ly (2012)
13. Why is all this
so important
to know?
Image source: 3 Geeks and a Law Blog (2011)
14. Pages Terms
are designed to
ensure page
legitimacy,
protect Facebook
users and
provide a safe
and positive user
experience for
everyone.
Image source: dan taylor/Flickr
15. “ Our terms aren't just a
document that protect our
rights; it's the governing
document for how the service
is used by everyone across the
world. Given its importance,
we need to make sure the
terms reflect the principles and
values of the people using the
”
service.
(Zuckerberg, 2009)
16. End note:
If you take the time to understand Facebook’s
Pages Terms and associated Terms of Use and
share these with your business, you will be a
responsible user, be respected as a legitimate
company and your customers and users will
have confidence in their interactions with you
because of your social media policies which
protect and enhance their experience with
you. And that means, more likes all round.
17. References
Facebook. (2012). Facebook Pages Terms. Accessed from https://www.facebook.com/page_guidelines.php.
fb Cover Lover. (2012). [Image] Accessed from http://www.fbcoverlover.com/categories/tags/attitude.
hy.ly. (2012). Facebook Timeline: 5 Dos and Don’ts for Choosing Your Cover Photo. [Image] Accessed from
http://hy.ly/2012/03/06/choosing-your-facebook-timeline-cover-photo/.
Management Today. (2012). [Image] Thumbs down for inappropriate content. Accessed from
http://www.mtmag.com.au/thumbs-down-for-inappropriate-content/.
mUmbrella. (2012). ASB rules brands are responsible for all fan comments on Facebook. Accessed from
http://mumbrella.com.au/asb-rules-brands-are-responsible-for-all-fan-comments-on-facebook-108037.
Smith, M. (2009). [Image] Does Facebook Really Own Your Data? Accessed from
http://www.marismith.com/does-facebook-really-own-your-data-no-its-about-openness/.
Software Latest Releases. (2010). [Image] Accessed from
http://www.software-latest.com/2010/08/26/facebook-no-chat-for-ie6.html.
Taylor, D. (n.d). dan taylor's photostream. [Image] Accessed from
http://www.flickr.com/photos/dantaylor/2044337954/.
Uniglobe. (n.d.) The State of Transparency. [Image] Accessed from
http://uniglobetravel.eu/56-1-Management-Reporting.html.
Wagner, E. (2012). Google Cracks Down on Phony Android. [Image] Accessed from
http://www.ericwagner.org/google-cracks-phony-android-apps/.
Zuckerberg, M. (2009). Update on Terms. The Facebook Blog. Accessed from
http://blog.facebook.com/blog.php?post=54746167130.
3 Geeks and a Law Blog. (2011). [Image] Accessed from http://www.geeklawblog.com/2011/04/im-sooo-
confused.html.