The document summarizes emerging technologies like cloud computing, social media, and mobile and how they are blurring the lines between search, surveillance, and privacy. It notes how these converging technologies are transforming the world while also raising implications for advertising, marketing, and potential consumer confusion. The document also examines some of the key issues and trends around these technologies like privacy and data security, intellectual property, and how everything is currently changing.
Using the present to create the future - the Web in South AfricaDerek Keats
Using the present to create the future: How can we move South Africa from consumer to producer of web technologies. My keynote talk at the ZAWWW2011 conference, Sept 15th, 2011 in Johannesburg.
Web 2.0 Technologies and Information ServicesYasar Tonta
This document discusses Web 2.0 technologies and their applications for information professionals. It begins with an outline that defines Web 2.0 and Library 2.0, and explores their benefits for information professionals. Several slides then provide more details on topics like the differences between digital immigrants and digital natives, definitions and characteristics of Web 2.0, examples of Web 2.0 technologies like wikis and blogs, and specific applications like RSS feeds and Yahoo Pipes. The goal is to explain emerging technologies and how information professionals can utilize them.
This document provides guidance on protecting yourself when communicating and browsing online. Some key recommendations include:
- Assume all internet communication is unsecured and can be intercepted, so use tools like digital signatures and encryption when security is needed.
- Be wary of emails that appear to be from trusted sources, as senders can be faked, and verify any suspicious messages before acting.
- Delete cookies regularly and disable them when possible to prevent tracking, but whitelist those needed for essential sites. Never use "remember me" functions.
- Use generic search terms when possible and alternate search engines to avoid a single site getting a full picture of search history tied to accounts. Log out of related services before searching.
- Cl
The document is a September 2011 business newsletter from News Online Xchange. It discusses trends in the online dating industry, including the growth of mobile dating apps and niche dating sites. It also provides an overview of technologies used by online dating sites to match users and convert them to paying customers, such as matching algorithms, psychological profiling of users, and communication options.
The document discusses the potential of virtual reality games that enable direct brain connections between players and servers. It outlines how this technology could allow for highly immersive VR experiences by facilitating information exchange without standard input devices. The summary discusses how such advanced VR games may be used to improve education, inspire creativity in solving problems, and address real-world issues through simulated scenarios. However, it also notes some potential negative impacts like isolation, loss of morality, and privacy/security risks if direct brain interfaces are not properly implemented and regulated.
In a digital world where nothing remains private, here's what consumer research revealed on what consumers think about the topic of data privacy.
I was very pleased to have the opportunity to co-author the piece, the first VCCP thought leadership paper.
Are Human Beings Becoming Dumb Terminals? Notes and Works CitedChris Boese
This presentation examines how interaction design decisions made in the name of ease of use may inadvertently shape human consciousness and encourage the outsourcing of thinking processes to the cloud. It discusses Jonathan Zittrain's framework of prescriptive "tethered appliances" versus more generative technology. The presentation argues that interaction designers should make the case for more generative interfaces that avoid turning users into "dumb terminals" and resist the push for narrowly limited, closed platforms.
Using the present to create the future - the Web in South AfricaDerek Keats
Using the present to create the future: How can we move South Africa from consumer to producer of web technologies. My keynote talk at the ZAWWW2011 conference, Sept 15th, 2011 in Johannesburg.
Web 2.0 Technologies and Information ServicesYasar Tonta
This document discusses Web 2.0 technologies and their applications for information professionals. It begins with an outline that defines Web 2.0 and Library 2.0, and explores their benefits for information professionals. Several slides then provide more details on topics like the differences between digital immigrants and digital natives, definitions and characteristics of Web 2.0, examples of Web 2.0 technologies like wikis and blogs, and specific applications like RSS feeds and Yahoo Pipes. The goal is to explain emerging technologies and how information professionals can utilize them.
This document provides guidance on protecting yourself when communicating and browsing online. Some key recommendations include:
- Assume all internet communication is unsecured and can be intercepted, so use tools like digital signatures and encryption when security is needed.
- Be wary of emails that appear to be from trusted sources, as senders can be faked, and verify any suspicious messages before acting.
- Delete cookies regularly and disable them when possible to prevent tracking, but whitelist those needed for essential sites. Never use "remember me" functions.
- Use generic search terms when possible and alternate search engines to avoid a single site getting a full picture of search history tied to accounts. Log out of related services before searching.
- Cl
The document is a September 2011 business newsletter from News Online Xchange. It discusses trends in the online dating industry, including the growth of mobile dating apps and niche dating sites. It also provides an overview of technologies used by online dating sites to match users and convert them to paying customers, such as matching algorithms, psychological profiling of users, and communication options.
The document discusses the potential of virtual reality games that enable direct brain connections between players and servers. It outlines how this technology could allow for highly immersive VR experiences by facilitating information exchange without standard input devices. The summary discusses how such advanced VR games may be used to improve education, inspire creativity in solving problems, and address real-world issues through simulated scenarios. However, it also notes some potential negative impacts like isolation, loss of morality, and privacy/security risks if direct brain interfaces are not properly implemented and regulated.
In a digital world where nothing remains private, here's what consumer research revealed on what consumers think about the topic of data privacy.
I was very pleased to have the opportunity to co-author the piece, the first VCCP thought leadership paper.
Are Human Beings Becoming Dumb Terminals? Notes and Works CitedChris Boese
This presentation examines how interaction design decisions made in the name of ease of use may inadvertently shape human consciousness and encourage the outsourcing of thinking processes to the cloud. It discusses Jonathan Zittrain's framework of prescriptive "tethered appliances" versus more generative technology. The presentation argues that interaction designers should make the case for more generative interfaces that avoid turning users into "dumb terminals" and resist the push for narrowly limited, closed platforms.
The Cluetrain Manifesto is a document consisting of 95 theses regarding the relationship between companies and online markets. Some of the key points made in the theses include:
1) Markets are conversations between human beings, not demographic segments.
2) Companies need to learn how to communicate with markets using a human voice rather than marketing jargon.
3) Networked markets are getting smarter and more organized, while most companies still try to use old communication styles.
4) Companies need to listen to both the conversations happening among employees and those happening among customers.
At SXSW there was no one key trend - as Bruce Springsteen said there was instead a set of "key notes". This presentation has a look at the five key macro trends and 10 key sub-trends that lay under these.
The document discusses the need for businesses to move from a top-down "broadcasting" approach to communication to a bottom-up networked approach that is more interactive and social. It emphasizes emergent architecture, cooperative IT development, and crowdsourcing over traditional top-down methods. Externally, businesses need to better listen to consumers, learn what they like, and encourage two-way participation and value exchange rather than one-way broadcasting of messages. The expectation is now for personalized, smart experiences enabled by new technologies and platforms that facilitate participation, sharing, and curation of content.
Conga is a social discovery platform that uses machine learning algorithms to identify patterns in individuals' social connections from existing social data. It then predicts new, highly relevant social connections for multiple markets and uses. Conga's algorithms go beyond simple techniques to model relationships and identify hidden factors that drive connections. As a cloud-based platform, Conga can add social relevance capabilities to nearly any application.
The document provides an overview of insights and how simple, unexpected insights can be highly effective at connecting with consumers and driving business outcomes. It begins with the story of Bernard Sadow developing the wheeled suitcase in the 1970s based on his observation of a man towing heavy machinery on a dolly, demonstrating how acute observation can lead to impactful innovations. It then discusses how insights are most powerful when they are unexpected and cause reexamination of standards. Several case studies are presented to illustrate how leveraging simple insights into human behavior through creative executions can be compelling, such as the Swedish Armed Forces recruitment campaign and the Monopoly City Streets online game. The document emphasizes that gaining critical consumer insights requires curiosity and a refreshed perspective to
Technology Changes, People Don't: Rethinking WorkAyelet Baron
This document discusses how technology is advancing rapidly while human behavior and social structures are changing more slowly. It argues that organizations must adapt to the new "social media age" by becoming more transparent, agile, and authentic, and by focusing on relationships and shared values rather than top-down control. Finally, it suggests that true innovation comes from collaboration and community effort rather than from individuals alone.
This document provides information about an upcoming Social Media Career Fair. It discusses how social media skills are now essential for many jobs. It also outlines some of the sessions that will be part of the career fair, including getting active in social media, understanding how social media skills relate to different types of jobs, and learning how to build trust and engage with audiences online. The career fair aims to help people understand how to harness social media for their careers.
Beyond Second Life: An Exploration of Real Libraries in Virtual WorldsRebecca Kate Miller
Poster presented by Rebecca K. Miller (Virginia Tech Libraries) at the LITA National Forum 2010. October 2, 2010, Atlanta, GA.
Research co-authors: Jorie Porter, Jenna Ryan, and Nancy Colyar
The document profiles different digital lifestyles that have emerged based on people's behavior and attitudes online. It identifies 6 main groups: Influencers, Communicators, Knowledge-Seekers, Networkers, Aspirers, and Functionals. Each group is characterized by their demographics, frequency of internet use, digital engagement and consumption levels, and openness to brands. The profiles provide insight into evolving online behaviors.
You're Being Watched! Living in a Data-Intense WorldBrian Inderwies
This document discusses how individuals leave extensive digital traces and data trails as they go about their daily lives. It notes that people are constantly feeding databases with records through actions like using loyalty cards, banking, mobile devices, cameras, and social media. However, it also discusses potential benefits of living in a data-intense world like increased knowledge, empowerment, preservation of history, and new ways of connecting. While privacy and surveillance are concerns, it presents options for learning to live with the reality of ubiquitous data or trying to game the system and leverage data for one's own benefit.
Utilising cutting edge techniques and taking advantage of market-leading expertise, Digital Life offers both a lens on the digital world and the frameworks required to make actionable business decisions within it. It can be used to drive global strategies or inform local tactics.
The document profiles different digital lifestyles that have emerged based on people's behavior and attitudes online. It identifies 6 main groups: Influencers, Communicators, Knowledge-Seekers, Networkers, Aspirers, and Functionals. Each group is characterized by their demographics, frequency of internet use, digital engagement and consumption levels, and openness to brands. The profiles provide insight into evolving online behaviors.
Information Services and Web 2.0: New Challenges and Opportunities. Yasar Tonta
Electronic Library: International Scientific Conference, Belgrade, September 25th-28th, 2008 –Summary book- Ed. By A. Vranes, L. Markovic & V. Crnogorac. Belgrade, 2008.
This document provides an overview of several major virtual worlds oriented towards kids, tweens, and teens (KT&T). It summarizes each world's key features, user base size, target age range, and approach to branding and marketing. The top virtual worlds for KT&T include Club Penguin, Webkinz World, Whyville, Gaia Online, and Neopets, with a combined user base of over 100 million accounts. These worlds integrate gaming, education, and social networking to engage youth audiences. The document also outlines several newer virtual worlds gaining popularity in this space.
Saiful Hidayat On Mobile Monday, Surfing In Digital Broadband Phenomenon, Cr...Saiful Hidayat
The document discusses creativity, innovation, and entrepreneurship in the digital age. It notes that we have moved from the Industrial Age to the Information Age to the Conceptual Age, where creativity and empathy are valued. It also discusses how digital technologies and broadband are driving new business models centered around user needs, participation, and open access to content. New types of digital content and services will focus on communication, information, entertainment and productivity.
The Interactive Advertising Bureau debuts a new study regarding the best uses of the data being rendered by social media. How are we defining social data in the marketing economy? How is it already being used by marketers to enrich profiling and craft campaigns? What industry practices have emerged for managing and appending these unique data sets to the rest of the big data pile? And how do marketers position themselves to leverage social data and avoid its weaknesses?
Presenter
Patrick Dolan, EVP and COO, IAB
The document discusses driving innovation and change within an organization. It defines change as the process of becoming different. It then provides tips for innovation advocates, such as articulating the downsides of inertia, sharing and exchanging ideas with stakeholders, and influencing the organization with external thinking. The tips advise defining opportunities, highlighting trends and needs, bringing stakeholders in early, prioritizing plans, hosting brainstorm sessions at different levels, and including outside experts.
The document discusses innovations in email marketing. It describes The Innovation Cloud solution which enables instant customer insights based on analyzing over 50 billion data points from email interactions like demos and purchases. It applies segment predictions at registration to enable targeted offers. Ividence's platform allows retailers to send less email but earn more through behavioral targeting and transparency. LiveIntent's platform allows dynamic targeting of devices, location, and time of day for ads and landing pages within a single email.
Bob Garfield is a marketing guru who believes companies should focus on the human element. He notes that trust in business has declined while trust in NGOs has increased, showing people prefer a consumer era over a product era. Garfield advises companies to kill customers with kindness by inspiring solutions and doing no unnecessary harm through authentic communications that respect integrity, trust and humanity.
The Cluetrain Manifesto is a document consisting of 95 theses regarding the relationship between companies and online markets. Some of the key points made in the theses include:
1) Markets are conversations between human beings, not demographic segments.
2) Companies need to learn how to communicate with markets using a human voice rather than marketing jargon.
3) Networked markets are getting smarter and more organized, while most companies still try to use old communication styles.
4) Companies need to listen to both the conversations happening among employees and those happening among customers.
At SXSW there was no one key trend - as Bruce Springsteen said there was instead a set of "key notes". This presentation has a look at the five key macro trends and 10 key sub-trends that lay under these.
The document discusses the need for businesses to move from a top-down "broadcasting" approach to communication to a bottom-up networked approach that is more interactive and social. It emphasizes emergent architecture, cooperative IT development, and crowdsourcing over traditional top-down methods. Externally, businesses need to better listen to consumers, learn what they like, and encourage two-way participation and value exchange rather than one-way broadcasting of messages. The expectation is now for personalized, smart experiences enabled by new technologies and platforms that facilitate participation, sharing, and curation of content.
Conga is a social discovery platform that uses machine learning algorithms to identify patterns in individuals' social connections from existing social data. It then predicts new, highly relevant social connections for multiple markets and uses. Conga's algorithms go beyond simple techniques to model relationships and identify hidden factors that drive connections. As a cloud-based platform, Conga can add social relevance capabilities to nearly any application.
The document provides an overview of insights and how simple, unexpected insights can be highly effective at connecting with consumers and driving business outcomes. It begins with the story of Bernard Sadow developing the wheeled suitcase in the 1970s based on his observation of a man towing heavy machinery on a dolly, demonstrating how acute observation can lead to impactful innovations. It then discusses how insights are most powerful when they are unexpected and cause reexamination of standards. Several case studies are presented to illustrate how leveraging simple insights into human behavior through creative executions can be compelling, such as the Swedish Armed Forces recruitment campaign and the Monopoly City Streets online game. The document emphasizes that gaining critical consumer insights requires curiosity and a refreshed perspective to
Technology Changes, People Don't: Rethinking WorkAyelet Baron
This document discusses how technology is advancing rapidly while human behavior and social structures are changing more slowly. It argues that organizations must adapt to the new "social media age" by becoming more transparent, agile, and authentic, and by focusing on relationships and shared values rather than top-down control. Finally, it suggests that true innovation comes from collaboration and community effort rather than from individuals alone.
This document provides information about an upcoming Social Media Career Fair. It discusses how social media skills are now essential for many jobs. It also outlines some of the sessions that will be part of the career fair, including getting active in social media, understanding how social media skills relate to different types of jobs, and learning how to build trust and engage with audiences online. The career fair aims to help people understand how to harness social media for their careers.
Beyond Second Life: An Exploration of Real Libraries in Virtual WorldsRebecca Kate Miller
Poster presented by Rebecca K. Miller (Virginia Tech Libraries) at the LITA National Forum 2010. October 2, 2010, Atlanta, GA.
Research co-authors: Jorie Porter, Jenna Ryan, and Nancy Colyar
The document profiles different digital lifestyles that have emerged based on people's behavior and attitudes online. It identifies 6 main groups: Influencers, Communicators, Knowledge-Seekers, Networkers, Aspirers, and Functionals. Each group is characterized by their demographics, frequency of internet use, digital engagement and consumption levels, and openness to brands. The profiles provide insight into evolving online behaviors.
You're Being Watched! Living in a Data-Intense WorldBrian Inderwies
This document discusses how individuals leave extensive digital traces and data trails as they go about their daily lives. It notes that people are constantly feeding databases with records through actions like using loyalty cards, banking, mobile devices, cameras, and social media. However, it also discusses potential benefits of living in a data-intense world like increased knowledge, empowerment, preservation of history, and new ways of connecting. While privacy and surveillance are concerns, it presents options for learning to live with the reality of ubiquitous data or trying to game the system and leverage data for one's own benefit.
Utilising cutting edge techniques and taking advantage of market-leading expertise, Digital Life offers both a lens on the digital world and the frameworks required to make actionable business decisions within it. It can be used to drive global strategies or inform local tactics.
The document profiles different digital lifestyles that have emerged based on people's behavior and attitudes online. It identifies 6 main groups: Influencers, Communicators, Knowledge-Seekers, Networkers, Aspirers, and Functionals. Each group is characterized by their demographics, frequency of internet use, digital engagement and consumption levels, and openness to brands. The profiles provide insight into evolving online behaviors.
Information Services and Web 2.0: New Challenges and Opportunities. Yasar Tonta
Electronic Library: International Scientific Conference, Belgrade, September 25th-28th, 2008 –Summary book- Ed. By A. Vranes, L. Markovic & V. Crnogorac. Belgrade, 2008.
This document provides an overview of several major virtual worlds oriented towards kids, tweens, and teens (KT&T). It summarizes each world's key features, user base size, target age range, and approach to branding and marketing. The top virtual worlds for KT&T include Club Penguin, Webkinz World, Whyville, Gaia Online, and Neopets, with a combined user base of over 100 million accounts. These worlds integrate gaming, education, and social networking to engage youth audiences. The document also outlines several newer virtual worlds gaining popularity in this space.
Saiful Hidayat On Mobile Monday, Surfing In Digital Broadband Phenomenon, Cr...Saiful Hidayat
The document discusses creativity, innovation, and entrepreneurship in the digital age. It notes that we have moved from the Industrial Age to the Information Age to the Conceptual Age, where creativity and empathy are valued. It also discusses how digital technologies and broadband are driving new business models centered around user needs, participation, and open access to content. New types of digital content and services will focus on communication, information, entertainment and productivity.
The Interactive Advertising Bureau debuts a new study regarding the best uses of the data being rendered by social media. How are we defining social data in the marketing economy? How is it already being used by marketers to enrich profiling and craft campaigns? What industry practices have emerged for managing and appending these unique data sets to the rest of the big data pile? And how do marketers position themselves to leverage social data and avoid its weaknesses?
Presenter
Patrick Dolan, EVP and COO, IAB
The document discusses driving innovation and change within an organization. It defines change as the process of becoming different. It then provides tips for innovation advocates, such as articulating the downsides of inertia, sharing and exchanging ideas with stakeholders, and influencing the organization with external thinking. The tips advise defining opportunities, highlighting trends and needs, bringing stakeholders in early, prioritizing plans, hosting brainstorm sessions at different levels, and including outside experts.
The document discusses innovations in email marketing. It describes The Innovation Cloud solution which enables instant customer insights based on analyzing over 50 billion data points from email interactions like demos and purchases. It applies segment predictions at registration to enable targeted offers. Ividence's platform allows retailers to send less email but earn more through behavioral targeting and transparency. LiveIntent's platform allows dynamic targeting of devices, location, and time of day for ads and landing pages within a single email.
Bob Garfield is a marketing guru who believes companies should focus on the human element. He notes that trust in business has declined while trust in NGOs has increased, showing people prefer a consumer era over a product era. Garfield advises companies to kill customers with kindness by inspiring solutions and doing no unnecessary harm through authentic communications that respect integrity, trust and humanity.
The document discusses how tablet adoption is growing rapidly and will reach 300 million by 2015. It then describes the Digital Publishing Suite (DPS) which allows publishers to create digital magazines and newspapers for tablets. DPS supports various article types, devices, and interactive features. Publishers can use DPS to generate revenue and build their brands. Data shows readers spend over an hour on DPS apps and are replacing printed content with digital. The document concludes by outlining how DPS can be used for marketing, branding, and corporate communications opportunities through engaging digital content.
The music video for Lady Gaga's song "Paparazzi" tells the story of her character struggling with fame and a relationship. It features her boyfriend throwing her from a balcony, with the paparazzi photographing her bloody body. Later, she gets revenge by poisoning his coffee. The video was critically acclaimed and won several awards. It has themes of media manipulation and criticism of celebrity culture. Lady Gaga's fashion and artistic style in the video also helped spread her iconic image.
La pandemia de COVID-19 ha tenido un impacto significativo en la economía mundial. Muchos países experimentaron fuertes caídas en el PIB y altas tasas de desempleo en 2020 debido a los bloqueos y restricciones. A medida que se implementan las vacunas, se espera que la actividad económica se recupere en 2021 aunque el panorama sigue siendo incierto.
The document discusses the concept of a digital footprint and how personal data is collected from various online activities and used by companies. It notes that an individual's digital footprint contains information about them that they share themselves as well as data about them from other sources, and this footprint can be analyzed to learn about the person. Control over personal data and digital footprints is important, as this information has value and privacy settings need to be managed to prevent unwanted access or use of people's data.
This talk was presented at Marketing Kingdom, Zagreb, 15 March 2013.
#Kingdom13 - feedback and reactions.
Ideas on Social & Innovation Waves
Socia is whatever we want it to be. Some of the greatest marketing minds are even themselves at odds for how to tackle social... yet it's all quite simple. It has to be.
We also look at the history of innovation, from early water power and printing to the industrial revolution and now digital. The cycles of innovation has accelerated with this Fifth Wave - the digital evolution.
We also talk of the highly recommended book - Crossing the Chasm - from Geoffrey Moore, where companies can learn how to cross their own business canyons.. to translate their traditional businesses into more enduring C21st entities online.
Touching on changes in media too, from the reversal of the traditional broadcasting model to more consumer-held models, we now need to feed consumers branded and crucially unbranded stories, which they can use within their own networks and groups.
Other topics we need to engage more in for social include better attention to what consumers and audiences are already saying. Responsiveness will win the day with more demonstrable engagement from the winning brands being increasingly recognized the mainstream public. Social media will continue to be a fore-runner in customer care and service, even cross and up-selling too.
Revisiting some important fundamentals in marketing and management, this talk also engages C-suite level debate on issues and opportunities affecting the industries of advertising, digital and public relations, as they increasingly converge and messages become no longer tied to particular channels.
Overall talk length: 45mins, interactive.
The document discusses the concept of "Big Tent Creativity" which involves using a wide variety of marketing channels and tactics to reach customers. It emphasizes segmenting large audiences, maintaining a consistent brand identity while allowing flexibility, distributing content wherever customers consume it, and taking a solutions-neutral approach by considering ideas from various sources. The goal is to be relevant by meeting customers in the physical, mental, and virtual places they engage with brands.
A decade ago, the higher education Web experience was segmented into walled gardens -- the public Web site, the course management system, online transactions, alumni communities, events calendars. The legacy of that structure was that our lifelong relationships with the college were interrupted as we students, faculty, staff, parents, and alumni moved from system to system.
The next-generation online ecosystem will let us re-organize these experiences, allowing for deepening engagement throughout our lives: from prospective student to elder alum. How will software like WordPress fit in? How can we evaluate, select, and configure systems to support our users' needs, rather than the other way around?
I talk about the evolution of digital content into services, the role of sensors in the future of the web, about the idea of man-machine collaboration in internet services, and about the role of social networking in building content.
Part of a series of interventions given at SciencesPo Paris by THIERRY JADOT, Starcom France CEO - featuring THOMAS JAMET, head of branded content at Newcast France.
The Future Of Advertising and How To Make It Work For You TodayAdNerds
The document discusses various topics related to the future of advertising including how advertising has changed and will continue to change as the world becomes more online and connected. It explores how social media, wearable technology, data collection, and personalized/targeted advertising will impact advertising. It also provides examples of how some early adopters are seeing success by embracing these changes.
Hyper-connectivity is disrupting industry boundaries and forcing brands to give up control. Smart brands of the future will focus less on strategy and consistency, and more on co-creating value through open and social interactions. Rather than pursuing excellence, brands will strive to connect through shared purpose and meaningful conversations. Control will be replaced with influence gained by activating valuable connections across networks.
Slides from my recent presentation in Chicago for the IFP Chicago Producers Series. Only a few new things for those of you who have seen me speak before, but I always upload the slides so attendees can get links, notes, etc.
This document discusses the evolution of mobile social networks and how they have changed people's lives. It uses two hypothetical people, Adrian and Ibrahim, to represent how social networks have progressed from online-only to incorporating mobile phones and computers. It argues that future mobile social networks should be more focused on physical social interactions and mobility rather than simply porting over online social features. They should leverage location data and physical proximity to better understand people's contexts and relationships.
The power of_mobile_and_social_data_webinar_slides_21_may2012Accenture
1. The document discusses the power of mobile and social data for businesses. It covers topics like sentiment analysis, the growing challenge of big data, and harnessing social data.
2. It presents a real-time sentiment analysis solution that uses in-memory processing to conduct automatic opinion extraction from social media at scale with low latency.
3. The document outlines challenges in exploiting social data for businesses and how data integration and management can help harness insights from social media. It provides examples of analyzing sentiment, influencers, and conversations.
This document contains a collection of quotes and passages on various topics related to technology and its impact on society. It discusses how technology has transformed our virtual experiences and mediated human life. While technology has enabled new forms of participation and sharing, it also risks exceeding our humanity if not developed and used responsibly. The document advocates recontextualizing authentic experiences and engaging open partnerships to address these challenges.
1. The document discusses the evolution of social media from its early beginnings to its current widespread global reach and integration across platforms.
2. It notes that social media is now the fourth most popular online activity and examines how organizations are using social media for marketing, communication, and influence.
3. The document suggests that future developments will include further integration across platforms and media, personalized experiences driven by social graphs and user data, and new forms of social search enabled by technologies like the semantic web.
In less than 20 years the Internet has evolved from an academic exercise of interconnected computers, to communication systems that redefine corporate communication. From a few thousand static web pages, to always-on on-demand multimedia news and entertainment channels. From providing simple discussion forums and chat rooms to a hugely popular web of experiences for real-time social interaction. So what comes next? Social media will infiltrate and enhance all of our personal and commercial, private and public endeavors faster than you think.
The document discusses how rural tourism destinations can use digital storytelling to enhance their competitiveness and attractiveness. It emphasizes finding compelling stories that will intrigue potential visitors and sharing those stories online through visual digital content and social media engagement in order to stand out among competitors. Connecting stories across geographical levels and cooperating with other tourism entities are also recommended to attract visitors interested in immersive travel experiences.
Using Social Media In Cross Media Direct Influence MarketingJeffrey Stewart
Social media is becoming the way that people communicate with their friends, family and the world in general. Marketers are finding that all these social networks provide new and exciting ways to communicate with customer communities and target like-minded prospects. In this session, Stewart explores how social media channels are providing new opportunities to directly influence customer behavior. He will explain how social media can be harnessed and integrated into 'traditional' cross-media campaigns. Attendees will leave this workshop with a much better understanding of where the future of direct marketing is headed and how the rules are changing.
My presentation about (data)visualisations during Apps for Ghent 2012. My main goal was to emphasize the force of a story and the possible abuse of data.
My speech to a group of local television broadcasters blends practical suggestions with an overview of broad trends in the future of television, expressed as a series of questions
Everyone can talk about networks in different contexts such as personal networks, professional networks, social networks, and more. A network consists of actors/nodes connected by ties that can represent relationships, interactions, or connections between the actors. Networks occur on different levels from individual networks to entire organizations and industries. Being connected to diverse networks can provide professional advantages and opportunities to access new resources and information. The strength of one's network, including the diversity of connections and ability to bridge different groups, influences performance and career mobility.
The document discusses emerging technologies and their impact on digital communication and customer experiences. It provides examples of how technologies like RFID, digital archives, and interactive mirrors are being used by brands like Levi's and Polo Ralph Lauren to enhance in-store shopping and inspire customer loyalty. Retailers are looking for new ways to personalize the customer experience and drive brand engagement using innovative applications of emerging technologies.
Visible Wireless: Grass Roots Branding and Media PlanningMediaPost
Visible Wireless, a retail brand of Verizon, doubled down on social channels to find and cultivate communities that wanted an alternative telecom model. And in turn those communities have informed everything about how the brand grew – from product development even to media planning. What does a grass roots media strategy look like?
MediaPost Data & Programmatic Insider Summit - Survey ResultsMediaPost
This document lists sponsors for an event including a title sponsor and presenting sponsors but provides no other context or information about the sponsors, event, or what is being sponsored. It repeats lists of "TITLE SPONSOR", "PRESENTING SPONSORS", and "SPONSORS" but with no distinguishing details between the lists.
Looking back on the migration to real-time programmatic from traditional media direct sales and ad network models, one can see parallels in the evolution of connected tv media buys today. However, there are powerful voices and a complicit media machine swimming against the current of change in how television content is valued, bought and sold. Are recurring programmatic inventory buying & selling patterns that preceded CTV likely to repeat themselves?
First-Party Data Takes The Cake In A Post-Cookie WorldMediaPost
Shopper behavior has been disrupted and now, more than ever, consumers are in the driver’s seat. As third-party cookies go away and data privacy regulations increase, consumer trust is paramount and should be earned through value exchange. Discover how the power of Kroger Precision Marketing’s first party data and advanced targeting capabilities has changed the media advertising ecosystem by holding media accountable for driving real business outcomes.
Real-time buying for real-time events: Leveraging Programmatic TV for Live Ev...MediaPost
Be memorable in the streaming space and learn how to best leverage real-time events on Live OTT with highly engaged, leaned forward audiences no matter your budget. Hear from one of the largest vMVPDs the value of executing live events programmatically and bring your strategy to the next level.
The Right Audience for the Job: Cadillac’s First Party Data Engine MediaPost
The Cadillac brand has been designing a new model (for consumer data, that is), which is aerodynamically suited to the next generation of information highway. It is powered by a single point of truth first party data engine that makes the company’s use of third party data more accurate and efficient and even finds new affinity audiences that work within a people-based marketing framework. Let’s take a test drive with Cadillac CRM, Audience and Personalization Manager Kate Wonsul.
Sustained Innovation Through Creativity, Technology & DataMediaPost
Avocados From Mexico has built one of the most successful digital practices in the industry in terms of both creativity and performance. Ivonne Kinser, AFM's head of digital marketing & ecommerce, will share the brand's approach to combine creativity, technology and data to develop stronger customer relationships that significantly increased the performance of their campaigns.
Search and Performance Insider Summit - Survey ResultsMediaPost
This document lists different levels of sponsorship for an event, including premier sponsor, title sponsor, sponsors, and presenting sponsor. It repeats these sponsorship levels multiple times.
Consumers demand privacy and digital marketing is evolving. Advertisers need a future-proof targeting solution that doesn't rely on third-party cookies or mobile identifiers. Hyper-relevant contextual targeting is a privacy-safe solution that goes beyond the keyword or category level to offer unparalleled relevance and reach in brand suitable environments, which means you can reach your target buyers at the moment they're most likely to engage - without cookies.
There's a lot of uncertainty and concern around the upcoming changes restricting 3rd party cookie based targeting. Marketers are scurrying to pivot against these changes with very little concrete guidance on what parameters will be in place.
The acceleration of streaming this past year has made video even more critical to a brand's growth strategy. Lexmark’s director of marketing operations, Mike Dattilo, shares how he’s successfully targeting SMB users to expand their audience, brand awareness and increase conversions through performance video.
This document lists the title sponsor and sponsors of an event four separate times without providing any other context or information. It repeats the title of "Title Sponsor" and "Sponsors" on each new line but does not include the names of any sponsors or other details about the event.
When Less is More: Building a Successful Advertising Business from a Subscrip...MediaPost
Lisa Ryan Howard is the Senior Vice President of Advertising at The New York Times. She discusses how the elimination of third-party cookies will impact digital advertising and outlines the key areas advertisers should focus on going forward, including understanding audience context, motivation, and propensity through analyzing topics, sections, emotions, objectives and history with the New York Times rather than relying on third-party data. She concludes by thanking the audience and looking forward to partnering with advertisers in 2022 and beyond.
What Do First Party Data and Golf Have In Common? MediaPost
As it turns out, two major strategies. Join Omeda leaders Tony Napoleone, VP Client Experience, and James Capo, COO, to discuss market changes and the two winning strategies you need with your audience data.
Turning Customers Into Fans: Church’s New Social Media PlaybookMediaPost
As social platforms fragment, brands need to remain flexible in their paid and organic strategies. Church’s Chicken reimagined its social media playbook for changed times. Alan Magee explains how they sought to encourage more than engagement but engender true brand fan love. With campaigns that broke through the clutter Church’s is growing its social footprint and engagement in ways that serve the core business and not just Follows and Likes.
Restaurant Customer Engagement: The Path to PersonalizationMediaPost
Driven by necessity and rising customer expectations, the digital transformation of restaurants is well underway. Your customers now engage with you through multiple channels across various devices, yet still expect you to seamlessly deliver highly personalized experiences. Join us to learn how restaurants can orchestrate these personalized customer journeys at scale.
Delivery & Streaming, the Ultimate Experience with RokuMediaPost
Dig into the secular shift to streaming. Join Jeff Katz, Head of Sales in the Central Region at Roku, as he shares 3 key updates for QSR Marketers from America’s #1 TV Streaming Platform:
- Foursquare QSR Insights
- Roku Platform Updates
- Beta Measurement Opportunity
Brand licensing is more than an incremental revenue opportunity for QSRs. It is a branding play that can have multiple benefits for branding, sales and even expansion. Using Cinnabon as an example, Focus explores how putting its legendary buns on grocery shelves and into pizza orders.
Three Tips to Maximize Creative Asset EfficiencyMediaPost
Advertising campaigns for quick service restaurants are a constant. You’re never NOT trying to get feet in the door. In an effort for brands and franchisees to meet audiences wherever they are with exciting promotions, marketers need to create exponential amounts of content, quickly. But quickly doesn't always mean efficiently. Join this session to learn three ways to get the most out of your ad creative and maximize the value of your assets.
The QSR Media Dispersion: Pre, Mid & Post Pandemic – By the NumbersMediaPost
The QSR media mix’s future was pulled forward by three years in April 2020. This was a necessary change and one that has helped the strong survive and grow. In this session, Senior Director of Sales for Simpli.fi, Casey Squier will review foot traffic trends, both nationally and locally, and the shift in ad spend across mobile, display, video, and CTV. He will also discuss a case study with a national QSR who did it right and is thriving in a post-Covid world.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMydbops
This presentation, titled "MySQL - InnoDB" and delivered by Mayank Prasad at the Mydbops Open Source Database Meetup 16 on June 8th, 2024, covers dynamic configuration of REDO logs and instant ADD/DROP columns in InnoDB.
This presentation dives deep into the world of InnoDB, exploring two ground-breaking features introduced in MySQL 8.0:
• Dynamic Configuration of REDO Logs: Enhance your database's performance and flexibility with on-the-fly adjustments to REDO log capacity. Unleash the power of the snake metaphor to visualize how InnoDB manages REDO log files.
• Instant ADD/DROP Columns: Say goodbye to costly table rebuilds! This presentation unveils how InnoDB now enables seamless addition and removal of columns without compromising data integrity or incurring downtime.
Key Learnings:
• Grasp the concept of REDO logs and their significance in InnoDB's transaction management.
• Discover the advantages of dynamic REDO log configuration and how to leverage it for optimal performance.
• Understand the inner workings of instant ADD/DROP columns and their impact on database operations.
• Gain valuable insights into the row versioning mechanism that empowers instant column modifications.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
3. Pay no attention to
that man behind the curtain!
So let’s look behind the curtain at the
implications to advertising, marketing ‚What chance has the
and the confusion arising between ignorant, uncultivated
search, surveillance and privacy, liar against the educated
expert? What chance
spawned by the convergence of three have I . . . . against a
innovative technological platforms that lawyer?‛ Mark Twain,
‚On the Decay of the Art
are also transforming our world: of Lying,‛ 1882
Cloud Computing
Social Media/Networking
Mobile/Wireless
4. If I Only Had Courage
The Rise of Cloud Computing
Cloud Computing:
Dynamically
scalable virtualized Yeah, it's sad, believe
me, Missy,When you're
information services born to be a sissy,
Without the vim and
verve. But I could show
delivered on demand my prowess, Be a lion,
not a "mowess,‚ If I only
over the Internet. had the nerve.
Yankee Group: ‚Clouds in 2010: Vendor Optimism Meets
Enterprise Realities, Yankee Group Research, Inc.
AND
With IPv6 there will be a
unique, static IP address for every device
5. Cloud Computing
What Me Worry?
Privacy & Data Security Business Continuity
Regulatory Compliance Insurance
Intellectual Property Antitrust – Competition
Ownership Pricing
Performance Metrics Availability & Access
Jurisdiction Shared Applications
Litigation & Government Shared Infrastructure
Contractual Relationship Shared Data Resources
Termination Competitive Issues
Tax Enforcement Issues
Disaster Recovery
INTEROPERABILITY
6. Cloud Trends to Watch
Telecom providers will begin
Cloud providers to close the gap between
will be able to grow public and private cloud
mindshare but not environments
market share (yet)
Private clouds present
both opportunities
and challenges
Cloud providers and
infrastructure builders will
invest in security and
compliance management
The collaboration
between
infrastructure
builders and software
vendors will intensify
7. If I Only Had A Heart
The Rise of Social Media
“The web is more a social
creation than a technical one. When a man's an empty
kettle, He should be on
I designed it for a social effect his mettle, And yet I'm
torn apart. Just because
– to help people work I'm presumin‘ That I
could be kinda human
together – and not as a If I only had a heart.
technical toy.”
Tim Berners-Lee, “Weaving the Web: The Original
Design and Ultimate Destiny of the World Wide Web”
8. Another “C” ???
Social Media Market Dynamics In the 1970s, Deep
Throat, a sexually
explicit pornographic
movie migrated sexually
Remember Content Context Control explicit sex from the
home into the movie
theater – hardly
•Enable Conversations confidential, private or
hidden from public
•Influence Conversations view. Yet also in the
1970s, the label ‚Deep
•Monitor Conversations Throat‛ became the
code-name for the
confidential source used
•React to Conversations by Carl Bernstein and
Bob Woodward of The
•Monetize Conversations Washington Post
investigating the
Watergate scandal
during the Nixon
In social media add: Conversation administration.
9. And now social climbing?
Given that studies consistently show consumers
trust other consumers – their peers – more than
advertisers (and government) when it comes to
product and service recommendations, does it
come as any surprise that ‘influence’ peddling has
now been extended to consumers.
10. If I Only Had A Brain . . . . .
The Rise of Mobile Tickets to
Discount Events Newspapers
Coupons & Magazines
Web Access TV, Radio
Search & E-mail & Movies
I could wile away the hours,
Conferrin' with the flowers,
Text, Image Consultin' with the rain.
& Voice Music
And my head I'd be scratchin'
While my thoughts were busy
hatchin'
If I only had a brain.
Payments Prescriptions
Books DVR
Currency Podcasts
Bluetooth ID & GPS
Security
11. Advertising Goes Has Gone Mobile
Web Technology, GPS, RFID, Bluetooth, Virtual Reality,
QR Codes, Augmented Reality Overlaid with Mobile
Further Blurs Surveillance and Privacy
User Search & Input
Social Networking with Location Sharing
Geo Targeting – Location, Location, Location
Coupling Location with Context
Coupling Location with Behavior
Coupling Location with Content
Location Sharing Capabilities
• Among Users; Among Devices; Among Others
12. Lions and Tigers and Bears,
Oh My!
Content = Intellectual Property
"Content is King‚ William Henry "Bill" Gates III, essay of the same title, 1996.
Context = Search, Surveillance
‚It is of interest to note that while some dolphins are reported to have learned
English - up to fifty words used in correct context - no human being has been
reported to have learned dolphinese.‛ Carl Sagan
Control = Privacy = $$$$$$
‚Privacy is the right to be alone--the most comprehensive of rights, and the
right most valued by civilized man.‛ Louis D. Brandeis
13. The ________ to Privacy ??
"The Right to Privacy"
Louis Brandeis & Samuel Warren
‚The intensity and 4 Harvard Law Review, 193-220 (1890-91)
complexity of life, attendant
upon advancing civilization,
have rendered necessary
some retreat from the
world…solitude and privacy
have become more essential
to the individual; but
modern enterprise and
invention have, through
invasions upon his privacy,
subjected him to mental pain
and distress…‛
14. 1993
On the Internet, nobody knows you’re a dog.
15.
16. 2012
On the Internet, everybody knows you’re a male beagle
who prefers dry dog food, sneaks into the master’s
bedroom, lying on the bed watching cable and who wears
a specially designed, hypo-allergenic flea collar.
17. I Have a Feeling We’re Not
In Kansas Anymore
Privacy is no longer just about controlling access
to us and information about us. We have become
schizophrenic in our use of terminology and
distinguishing between the information and the
collection and use of the information.
Sometimes I lie awake at
References to privacy are now consistently and night and ask ‚Where
have I gone wrong?‛
persistently used to refer to online search,
Then a voice says to me,
surveillance, data matching, data mining, ‚This is going to take
profiling, geo-targeting and other forms of more than one night.‛
behavioral data gathering Charlie Brown, from
Peanuts, by Charles
Schulz
Perceived as a belief there is also a right to control information about
us . . . even if that information is publicly available and even if it is
neither confidential, nor sensitive.
18. Everyone is Schizophrenic,
Why Should the Law Be Different
Surveillance is viewed both as a way to avoid or
minimize risk and also as a cause of risk.
We welcome the prevention
Law of accidents, terrrorism and
crime, but bemoan the
intrusion by governments,
Contextual & Societal corporations and private
Norms & Rules
citizens, into our private
lives and the use and
exploitation of information
Technology/Platform about us.
20. Changing the Tires on a Moving Car?
Governmental intervention may be necessary to protect consumers from abuse, but
can a concretized, codified piece of legislation remain relevant or defensible as
innovation and technology which could not be predicted remains unpredictable?
Since consumer privacy and data protection have always been context specific and will
continue to evolve, how can they be harmonized across nations, cultural and local
boundaries;
Mobile devices will expand the domain of advertising, challenging the ability to
capture consumers’ interest on mobile screens, while the opposite takes place in living
rooms – distinctions between desktop computing and home entertainment being
irrelevant;
Cloud computing and interoperable providers will make content, application
programming and processing accessible anywhere, anytime and will effectively
outsource the evolution of technology, making distinctions between and among
devices irrelevant.
Online gaming and the interplay between gaming console, entertainment and product
placement, virtual worlds and display advertising are all blurring (pardon the pun)
right before our eyes.
Since advertising models and economics, together with legal frameworks, continue to
change, with metrics and quantification methodologies argued over, the roles of
advertisers, agencies, media buyers, broadcast and publishing networks as well as
ISPs, search engine, browser and web hosting companies – the technology players –
will also continue to change.
21.
22. Everything is Changing
And Change is Difficult
If consumers are empowered and brands and
advertisers and agencies can’t control what they
traditionally controlled then:
•Advertising & Marketing must change;
•Economics & Revenue Streams must change;
•Rules of Engagement must change; and
•Regulation, Law & Lawyers must change!
But Change is Difficult
23. Does This Make You Happy
or Make You Nervous?
Pizza Palace ‘30 Minutes or it’s Free’
24.
25. Resources – More Information
www.adlawbyrequest.com www.advertisingcompliancelaw.com
www.reedsmith.com/networkinterference http://www.reedsmith.com/cloudcomputing
Coming Soon:
Mobile Mayhem: A Legal Guide to a Wireless World
26. Thank You !
April 22-25 • South Seas Island Resort • Captiva Island, Florida
Questions??
Joseph I. Rosenbaum
Partner & Chair
Advertising Technology & Media Law Practice
T: 212 702—1303 M: 646 522-0083
jrosenbaum@reedsmith.com
www.LegalBytes.com
Editor's Notes
“If everything seems under control, you’re just not going fast enough.” Mario Andretti