The goal of this presentation is to improve your skills when giving a talk to an audience of more than one. Know your audience, know your material, in short…
Expand your business to the frequent shopper, brand loyal, African American consumer. The African American population has the buying power of nearly $1 trillion and is 44% more likely to take a class online. In July of 2011, there were 23.9 million African American internet users and 76% visited a social networking site or blog. Do you have a plan of action to engage with African American Consumer?
This document provides an overview of Google search strategies and search engines. It discusses how students typically conduct searches, focusing on a single search engine and keywords rather than additional search techniques. Various Google search strategies are then outlined, including using quotation marks for phrases, operators like + - and (), and limiting searches by file type, date range, or site. Other Google tools like News, Books and Scholar are briefly described. The document encourages the reader to practice advanced search techniques and bookmark resources using Delicious before the next in-person meeting.
This document summarizes an Early Additional Language (EAL) session at the NIST elementary school. It discusses factors that affect additional language acquisition such as mother tongue proficiency and access to native speakers. The EAL program aims to help English language learners succeed academically and socially through in-class support from EAL teachers and withdrawal sessions. EAL teachers provide language instruction, modify activities, and collaborate with classroom teachers. The document provides tips for parents such as using the mother tongue at home and reading with their child in English.
Expand your business to the frequent shopper, brand loyal, African American consumer. The African American population has the buying power of nearly $1 trillion and is 44% more likely to take a class online. In July of 2011, there were 23.9 million African American internet users and 76% visited a social networking site or blog. Do you have a plan of action to engage with African American Consumer?
This document provides an overview of Google search strategies and search engines. It discusses how students typically conduct searches, focusing on a single search engine and keywords rather than additional search techniques. Various Google search strategies are then outlined, including using quotation marks for phrases, operators like + - and (), and limiting searches by file type, date range, or site. Other Google tools like News, Books and Scholar are briefly described. The document encourages the reader to practice advanced search techniques and bookmark resources using Delicious before the next in-person meeting.
This document summarizes an Early Additional Language (EAL) session at the NIST elementary school. It discusses factors that affect additional language acquisition such as mother tongue proficiency and access to native speakers. The EAL program aims to help English language learners succeed academically and socially through in-class support from EAL teachers and withdrawal sessions. EAL teachers provide language instruction, modify activities, and collaborate with classroom teachers. The document provides tips for parents such as using the mother tongue at home and reading with their child in English.
Sketch or Die (or live life as a miserable creative)! In this presentation I'm trying really hard to convince you to bring and use your sketch book everywhere. Let me know if it works:-) Make the most out of your days at school, those hours spent doing stuff is going to make the next 40 years of work fun and inspiring…
This document discusses the history of writing systems in Egypt from ancient Egyptian hieroglyphs to modern times, mentions George Orwell's novel 1984 and includes links to videos about Egyptian hieroglyphs and the artist Ji Lee as well as the Swedish words for thoughtfulness, consideration and alone.
This document outlines the semester plan for a course on applied storytelling. It includes an overview, introductions, expectations, editing skills, and guest speakers. Students will create a photo novel assignment and learn about different forms of visual storytelling through film, images, and websites.
Kasper is introducing Christina Skreiberg, a blogger, and her photos taken by Cat and Mathilda. The document shows technological advancements from 1966 to 2011, including color TVs, CD players, walkmans, VHS tapes, mobile phones, the internet, digital cameras, iPods, social media platforms like Myspace, Facebook, and Twitter, and devices like iPhones, iPads, and Kindles.
The document discusses the history of fanzines, listing Amazing Stories from April 1926 and Twisted Magazine from 1996. It also provides instructions on how to easily make a fanzine in 1-2-3 steps by using free fonts from dafont.com, images from Flickr under Creative Commons licenses, and wishes the reader good luck in their fanzine creation.
Typography is the art and techniques of arranging type, including type design and modifying glyphs. The document then provides a brief history of typography from cave paintings to modern digital fonts. It discusses various type classifications like serif, sans serif, slab serif, script, and dingbats. The document concludes with some basic typography rules regarding font usage, text formatting, and links to additional typography resources.
The document provides information on building websites using HTML or Flash, including discussing website structure and components like HTML, CSS, images, and Flash or video files. It also discusses domain names, hosting, analytics, blogs, portfolios, and free database solutions for portfolios. The document concludes by providing some links for inspiration on web design, typography, user interface design, and websites with beautiful typography.
This document provides tips and guidance for creating an effective portfolio. It recommends including an intro, 2-3 highlighted projects showcasing skills and experience, and details about your process. The portfolio should have consistency, focus on your strengths, and include your most recent work. When meeting with potential clients or employers, come prepared to discuss your relevant work and be able to ask questions. An accompanying business card can help to leave a lasting impression after a meeting. Finally, the document stresses that the quality of your work is the most important element of an effective portfolio.
This very short document appears to be gibberish without any coherent words or meaning. It contains random letters and symbols without forming any real sentences, paragraphs or overall structure. The document does not provide any essential information that could be summarized due to its nonsensical and incoherent nature.
Typography is the art and techniques of arranging type, including type design and modifying glyphs. It has a long history from cave paintings to movable type invented by Gutenberg in the 1430s. Typefaces are classified into categories like serif, sans serif, slab serif, script, and dingbats. Effective typography follows rules such as using a varied but limited number of typefaces, appropriate capitalization, alignment, line length, and font size.
This document discusses basic typography, color, image, and layout concepts. It covers color formats like RGB and CMYK, color properties such as hue and saturation, and color systems including Pantone and special process colors. It also touches on topics like raster dots, black printing, and resources for exploring color schemes.
This document provides an overview of basic typography, color, image, and layout concepts including file formats like vector, pixel, RGB, and CMYK color modes. It also discusses resolution and DPI for print vs. online use as well as low-cost image file format and stock photo resource options.
This document discusses basic typography principles including:
- History and overview of type systems, fonts, and font anatomy
- Factors that influence readability such as font choice, size, leading, and contrast
- Digital typography considerations like font formats, tools, and cross-publishing legibility
- Resources for further typography exploration
The document provides information on building websites using HTML or Flash, including discussing website structure using files like HTML, CSS, and images, as well as topics like domain names, hosting, analytics, and designing portfolios. It also lists some pros and cons of using Flash versus HTML, and provides additional resources on web design, typography, and creating an online portfolio. The document serves as a general guide for designing and developing websites.
I did my Pecha Kucha late november 08, talking about my URL addiction. It was a really great experience, huge crowd. This keynote is very visual, but I hope I make my point with out the words
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Sketch or Die (or live life as a miserable creative)! In this presentation I'm trying really hard to convince you to bring and use your sketch book everywhere. Let me know if it works:-) Make the most out of your days at school, those hours spent doing stuff is going to make the next 40 years of work fun and inspiring…
This document discusses the history of writing systems in Egypt from ancient Egyptian hieroglyphs to modern times, mentions George Orwell's novel 1984 and includes links to videos about Egyptian hieroglyphs and the artist Ji Lee as well as the Swedish words for thoughtfulness, consideration and alone.
This document outlines the semester plan for a course on applied storytelling. It includes an overview, introductions, expectations, editing skills, and guest speakers. Students will create a photo novel assignment and learn about different forms of visual storytelling through film, images, and websites.
Kasper is introducing Christina Skreiberg, a blogger, and her photos taken by Cat and Mathilda. The document shows technological advancements from 1966 to 2011, including color TVs, CD players, walkmans, VHS tapes, mobile phones, the internet, digital cameras, iPods, social media platforms like Myspace, Facebook, and Twitter, and devices like iPhones, iPads, and Kindles.
The document discusses the history of fanzines, listing Amazing Stories from April 1926 and Twisted Magazine from 1996. It also provides instructions on how to easily make a fanzine in 1-2-3 steps by using free fonts from dafont.com, images from Flickr under Creative Commons licenses, and wishes the reader good luck in their fanzine creation.
Typography is the art and techniques of arranging type, including type design and modifying glyphs. The document then provides a brief history of typography from cave paintings to modern digital fonts. It discusses various type classifications like serif, sans serif, slab serif, script, and dingbats. The document concludes with some basic typography rules regarding font usage, text formatting, and links to additional typography resources.
The document provides information on building websites using HTML or Flash, including discussing website structure and components like HTML, CSS, images, and Flash or video files. It also discusses domain names, hosting, analytics, blogs, portfolios, and free database solutions for portfolios. The document concludes by providing some links for inspiration on web design, typography, user interface design, and websites with beautiful typography.
This document provides tips and guidance for creating an effective portfolio. It recommends including an intro, 2-3 highlighted projects showcasing skills and experience, and details about your process. The portfolio should have consistency, focus on your strengths, and include your most recent work. When meeting with potential clients or employers, come prepared to discuss your relevant work and be able to ask questions. An accompanying business card can help to leave a lasting impression after a meeting. Finally, the document stresses that the quality of your work is the most important element of an effective portfolio.
This very short document appears to be gibberish without any coherent words or meaning. It contains random letters and symbols without forming any real sentences, paragraphs or overall structure. The document does not provide any essential information that could be summarized due to its nonsensical and incoherent nature.
Typography is the art and techniques of arranging type, including type design and modifying glyphs. It has a long history from cave paintings to movable type invented by Gutenberg in the 1430s. Typefaces are classified into categories like serif, sans serif, slab serif, script, and dingbats. Effective typography follows rules such as using a varied but limited number of typefaces, appropriate capitalization, alignment, line length, and font size.
This document discusses basic typography, color, image, and layout concepts. It covers color formats like RGB and CMYK, color properties such as hue and saturation, and color systems including Pantone and special process colors. It also touches on topics like raster dots, black printing, and resources for exploring color schemes.
This document provides an overview of basic typography, color, image, and layout concepts including file formats like vector, pixel, RGB, and CMYK color modes. It also discusses resolution and DPI for print vs. online use as well as low-cost image file format and stock photo resource options.
This document discusses basic typography principles including:
- History and overview of type systems, fonts, and font anatomy
- Factors that influence readability such as font choice, size, leading, and contrast
- Digital typography considerations like font formats, tools, and cross-publishing legibility
- Resources for further typography exploration
The document provides information on building websites using HTML or Flash, including discussing website structure using files like HTML, CSS, and images, as well as topics like domain names, hosting, analytics, and designing portfolios. It also lists some pros and cons of using Flash versus HTML, and provides additional resources on web design, typography, and creating an online portfolio. The document serves as a general guide for designing and developing websites.
I did my Pecha Kucha late november 08, talking about my URL addiction. It was a really great experience, huge crowd. This keynote is very visual, but I hope I make my point with out the words
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Presentation (EN)
1.
2. Powerpoint from hell
✓ Use as little text as possible, your audience will read your slide
instead of listening to you.
✓ Filling upyourself towill make it look messy and“one liners”. focus,
restrict
the slide
less objects and embrace
you will loose
✓ Don’t use clip art, it will ruin your authority.
Your auntie uses clipart.
✓ Choose one font & few colors!
✓ Spend time (and Money) on images.
5. Video,
Start 10min sound, joke Dip 0.2 End
Remember, the last
slide is your legacy
• You
0 5 Untitled 3 10 15 20 25
• Audience
( Dramaturgy )
6. Practice, Practice, Practice
Make notes, memorize
Adjust slides
Vary the images
Time your talking, short
Use friends as audience
Make an audio recording, webcam
7. Present
Why are you listning to me?
Leave notes, use pointers
Stand still, don’t fiddle
Look at your audience, all of them
Take breaks
Ask for questions
8. Tools
Choose right presentation software
Sound, is it on?
Setup must be flawless
• Sound on mac (shift key)
• Sleep mode (Caffeine, control panel)
Remote control
make sure it works, if not – use arrows
14. 3 Important
Who’s your audience?
What’s your goal?
•Inform (details, knowledge)
•Entertain (win, sell)
•Both
How much time do you have?
•After 10min, focus drops
17. Keep it simple
Limit bullet & text
Limit transitions & builds
Use high-quality graphics
Have a visual theme, avoid PPT templates
Use appropriate charts
Use color well
Choose your fonts well
Use video or audio
Spend time in the slide order
http://www.garrreynolds.com/Presentation/