How to Catch Frogs - The Impact of Disruptive Technology to African TravellersStephenie Rodriguez
The document discusses how mobile connectivity is driving innovation in Africa and how businesses can maximize opportunities through mobile. It notes that mobile phones dominate in South Africa and mobile internet is Africa's gateway to connectivity. It provides tips for businesses on how to engage mobile customers through contextual relevance, real-time merchandising, immersive experiences, and data analytics. The goal is to design mobile-first and leverage proximity tools, paid media, and personalization to engage customers on the go.
This presentation was given at The Trinity Forum in Taipei September 21, 2014. The Trinity Forum is a think tank for Airports, Brands and DutyFree/Travel Retailers hosted by ACI - Airports Council International and The Moodie Report. This presentation gives top line insight on how disruptive technology is changing the experience for travelers and how IBeacons, Smartphones like the Iphone6, wearable technology, mobile payments, applications and Social Media can now be harnessed in more powerful ways.
The document discusses techniques for persistently infecting a computer's BIOS in order to achieve stealthy and operating system-independent malware behavior. It provides background on BIOS structure and updating process. Methods demonstrated include patching the BIOS decompression routine and modifying hard disk contents or Windows binaries from within the BIOS before any other software loads. Both virtual machine and real hardware demonstrations are described. The goal is to develop a "true persistency rootkit" that maintains control below the level of any operating system.
LinkedIn is a professional network of over 36 million members from around the world representing 170 industries. It allows users to find and connect with qualified professionals to collaborate with to accomplish goals. Users can manage their public profile, find potential clients and partners, and gain insights from private group discussions. Companies can create profiles to promote their brand and recruit top talent through job postings. The document encourages readers to create a profile and become active members of the LinkedIn network.
Concerned about how to mitigate reputation risks as you foray into social media communication? This presentation offers my top tested tips on how to ensure you have the right guardrails and resources in place and why this matters more and more. Got a question? Feel free to ask or leave me a comment, please.
We sell used industrial equipment. Our inventory includes various pieces of previously owned machinery used for industrial purposes. Please contact us if you need any used equipment for your industrial operations or facilities.
The Six Dirty Pretty Secrets of Digital, Mobile and Social MediaStephenie Rodriguez
Presented by Stephenie Rodriguez at the FAB Conference in Copenhagen, Denmark in June 2014, this presentation was delivered to CEOs and key decision marketers in travel food and beverage, airport operations, travel retail brands and trade media at the Moodie Report's annual meeting and awards.
How to Catch Frogs - The Impact of Disruptive Technology to African TravellersStephenie Rodriguez
The document discusses how mobile connectivity is driving innovation in Africa and how businesses can maximize opportunities through mobile. It notes that mobile phones dominate in South Africa and mobile internet is Africa's gateway to connectivity. It provides tips for businesses on how to engage mobile customers through contextual relevance, real-time merchandising, immersive experiences, and data analytics. The goal is to design mobile-first and leverage proximity tools, paid media, and personalization to engage customers on the go.
This presentation was given at The Trinity Forum in Taipei September 21, 2014. The Trinity Forum is a think tank for Airports, Brands and DutyFree/Travel Retailers hosted by ACI - Airports Council International and The Moodie Report. This presentation gives top line insight on how disruptive technology is changing the experience for travelers and how IBeacons, Smartphones like the Iphone6, wearable technology, mobile payments, applications and Social Media can now be harnessed in more powerful ways.
The document discusses techniques for persistently infecting a computer's BIOS in order to achieve stealthy and operating system-independent malware behavior. It provides background on BIOS structure and updating process. Methods demonstrated include patching the BIOS decompression routine and modifying hard disk contents or Windows binaries from within the BIOS before any other software loads. Both virtual machine and real hardware demonstrations are described. The goal is to develop a "true persistency rootkit" that maintains control below the level of any operating system.
LinkedIn is a professional network of over 36 million members from around the world representing 170 industries. It allows users to find and connect with qualified professionals to collaborate with to accomplish goals. Users can manage their public profile, find potential clients and partners, and gain insights from private group discussions. Companies can create profiles to promote their brand and recruit top talent through job postings. The document encourages readers to create a profile and become active members of the LinkedIn network.
Concerned about how to mitigate reputation risks as you foray into social media communication? This presentation offers my top tested tips on how to ensure you have the right guardrails and resources in place and why this matters more and more. Got a question? Feel free to ask or leave me a comment, please.
We sell used industrial equipment. Our inventory includes various pieces of previously owned machinery used for industrial purposes. Please contact us if you need any used equipment for your industrial operations or facilities.
The Six Dirty Pretty Secrets of Digital, Mobile and Social MediaStephenie Rodriguez
Presented by Stephenie Rodriguez at the FAB Conference in Copenhagen, Denmark in June 2014, this presentation was delivered to CEOs and key decision marketers in travel food and beverage, airport operations, travel retail brands and trade media at the Moodie Report's annual meeting and awards.
The document discusses techniques for persistently infecting a computer's BIOS in order to achieve stealthy and operating system-independent malware behavior. It provides background on BIOS structure and updating processes. Methods demonstrated include patching the BIOS decompression routine and modifying hard disk contents or Windows binaries from within the BIOS before other software loads. Both virtual machine and real hardware demonstrations are described.
This keynote presentation was delivered by Stephenie Rodriguez at the Marina Bay Sands Exhibition at the TFWA Asia Pacific Conference. The subject of the session was e-Perfect and designed to give tax free retailers and partners insights into how to succeed and save money in the areas of digital, mobile, social and cloud computing.
Connecting Classrooms through Global Project Based Learning Activities and Re...Kim Caise
This webinar will discuss strategies and ideas to use in a to enrich instruction by having students participate in global collaborative projects. Project based learning resources will be shared along with instructional strategies to implement this type of teaching style in global collaborative learning activities will also be featured with supplementary resources shared with participants. Research that illustrates the importance of assisting students develop a global awareness and resources for implementing inquiry based learning activities will be shared in this webinar. Global collaborative projects and technology integration are key components of preparing students for success as responsible citizens and future leaders in their personal careers and endeavors after graduation. Ideas presented can be modified to meet a variety of common core standards, fit content areas and will be appropriate for several grade levels.
Please join this national board certified teacher in the area of technology education, Kim Caise, M. Ed., who has over 20 years of experience in education for this presentation. She has seen how student learning can be enriched when engaging, interactive activities are incorporated into instruction. Kim has a been classroom teacher, technology specialist and currently mentors educators providing assistance in revolutionizing instruction and impacting virtual learning incorporating technology resources and tools using web conferencing that focuses on technology integration topics faces educators today.
The document discusses various ways that cell phones can be used in the classroom, including:
1. Using apps like Mentimeter for polling students in real-time.
2. Allowing students to post pictures, audio, and videos from their phones to sites like Tumblr, Cellblock, and Qik for class projects and activities.
3. Enabling students to call or text phone numbers to participate in discussions, post tweets, and take polls.
This document discusses search engine optimization (SEO) and search engine marketing (SEM). It defines SEO as using keywords in content and metadata to naturally rank higher in search engines. SEM involves paying for ad placements and paying per click on ads. The document provides examples of on-page optimization for ESPN and Dell, and explains how to set up an AdWords campaign, including choosing keywords, determining a budget, writing ads, and analyzing results. Statistics show most companies use Google AdWords and engage in both SEO and SEM.
WTF - What's The Future Impact of Disruptive Technology on Communications?Stephenie Rodriguez
Presented at the IABC World Conference in San Francisco this presentation reviews the four trends that are causing disruption, articulates the Axis of Relevance and how we can use available data to create contextual intelligence. We review the growth in the internet of things, and how sensors Ibeacons, wearable technology and social media are disruptive and review dynamic data models to help business gain real time insights and solve complex business problems. #bigdata #Communication
The Use of Online Learning to Improve Math InstructionKim Caise
This capstone paper discusses the use of online learning to enrich and improve math instruction. Voicethread is the featured technology tool within a Moodle course for teachers to complete and implement in their mathematics instruction.
Here are 10 Commandments of Digital, Mobile, Social Media and overall online marketing for both B2B and B2C segments. After all, we sell to people and all marketing it B2P. Special thanks for inspiration from Brian Solis, Jeremiah Owyang, Scott Stratten, and Charlene Li and hat tip to creators of Lego and Star Wars for helping make learning these valuable lessons fun. (and thanks to Gabe Zichermann for teaching me the importance of fun!)
The document discusses techniques for persistently infecting a computer's BIOS in order to achieve stealthy and operating system-independent malware behavior. It provides background on BIOS structure and updating processes. Methods demonstrated include patching the BIOS decompression routine and modifying hard disk contents or Windows binaries from within the BIOS before other software loads. Both virtual machine and real hardware demonstrations are described.
This keynote presentation was delivered by Stephenie Rodriguez at the Marina Bay Sands Exhibition at the TFWA Asia Pacific Conference. The subject of the session was e-Perfect and designed to give tax free retailers and partners insights into how to succeed and save money in the areas of digital, mobile, social and cloud computing.
Connecting Classrooms through Global Project Based Learning Activities and Re...Kim Caise
This webinar will discuss strategies and ideas to use in a to enrich instruction by having students participate in global collaborative projects. Project based learning resources will be shared along with instructional strategies to implement this type of teaching style in global collaborative learning activities will also be featured with supplementary resources shared with participants. Research that illustrates the importance of assisting students develop a global awareness and resources for implementing inquiry based learning activities will be shared in this webinar. Global collaborative projects and technology integration are key components of preparing students for success as responsible citizens and future leaders in their personal careers and endeavors after graduation. Ideas presented can be modified to meet a variety of common core standards, fit content areas and will be appropriate for several grade levels.
Please join this national board certified teacher in the area of technology education, Kim Caise, M. Ed., who has over 20 years of experience in education for this presentation. She has seen how student learning can be enriched when engaging, interactive activities are incorporated into instruction. Kim has a been classroom teacher, technology specialist and currently mentors educators providing assistance in revolutionizing instruction and impacting virtual learning incorporating technology resources and tools using web conferencing that focuses on technology integration topics faces educators today.
The document discusses various ways that cell phones can be used in the classroom, including:
1. Using apps like Mentimeter for polling students in real-time.
2. Allowing students to post pictures, audio, and videos from their phones to sites like Tumblr, Cellblock, and Qik for class projects and activities.
3. Enabling students to call or text phone numbers to participate in discussions, post tweets, and take polls.
This document discusses search engine optimization (SEO) and search engine marketing (SEM). It defines SEO as using keywords in content and metadata to naturally rank higher in search engines. SEM involves paying for ad placements and paying per click on ads. The document provides examples of on-page optimization for ESPN and Dell, and explains how to set up an AdWords campaign, including choosing keywords, determining a budget, writing ads, and analyzing results. Statistics show most companies use Google AdWords and engage in both SEO and SEM.
WTF - What's The Future Impact of Disruptive Technology on Communications?Stephenie Rodriguez
Presented at the IABC World Conference in San Francisco this presentation reviews the four trends that are causing disruption, articulates the Axis of Relevance and how we can use available data to create contextual intelligence. We review the growth in the internet of things, and how sensors Ibeacons, wearable technology and social media are disruptive and review dynamic data models to help business gain real time insights and solve complex business problems. #bigdata #Communication
The Use of Online Learning to Improve Math InstructionKim Caise
This capstone paper discusses the use of online learning to enrich and improve math instruction. Voicethread is the featured technology tool within a Moodle course for teachers to complete and implement in their mathematics instruction.
Here are 10 Commandments of Digital, Mobile, Social Media and overall online marketing for both B2B and B2C segments. After all, we sell to people and all marketing it B2P. Special thanks for inspiration from Brian Solis, Jeremiah Owyang, Scott Stratten, and Charlene Li and hat tip to creators of Lego and Star Wars for helping make learning these valuable lessons fun. (and thanks to Gabe Zichermann for teaching me the importance of fun!)