These slides were used at the "Social Media: The Bad and The Ugly" panel at Blog World & New Media Expo 2009.
The panel also featured Amber Naslund, Robert Scoble and Wayne Sutton.
We discussed some trends in social media that concern us and could harm the growth of the medium as a whole. These are also trends that could harm your brand, scare people away and damage your reputation.
Even a blogger who have written thousand of post sometimes feels lack of ideas. I have written some tips to find ideas for writing blog posts.
For more information look here :http://presentslide.org/2016/07/finding-ideas-for-your-next-blog-post/
The Keeper of Secrets: The Dance of Community LeadershipLeslie Hawthorn
This talk was delivered as the closing keynote at the FOSDEM 2013 Conference.
Video is available at http://video.fosdem.org/2013/maintracks/Janson/The_Keeper_of_Secrets.webm
This content is licensed CC-By-3.0, so please use, remix and share widely!
Abstract:
Leaders in communities that value openness and transparency are faced with a difficult challenge: people confide in you constantly, but your role as a leader is to promote positive change in your project; change only proceeds where information flows. How does one negotiate the need to maintain trust and harmony in the human sides of our interactions in development communities, while still ensuring that the social problems that may inhibit community progress are mitigated? How does one manage to do all this while keeping one’s commitments to one’s friends and to project values like transparency and openness?
In this talk, Leslie Hawthorn will explore the role of secrets and disclosure in our open development communities. Specifically, she will explore how good leaders know when to discuss secrets, when to remain mum and, in particular, how to tell secrets "the right way". Drawing on six years of experience working with 100s of FOSS communities, she will discuss some of the most contentious and hilarious social problems she’s encountered and how they were addressed, with names and details omitted sufficiently well to keep her own commitments to confidentiality.
An amalgamation of Social Media stats and info along with some examples of the good and the bad. And of course what it means for the way organisations talk to customers.
Presentation for Power on your career by listening to industry experts at Microsoft Sri Lanka - YouthSpark Live 2016.
Via: https://www.facebook.com/MicrosoftSL/photos/gm.1794889820798558/1498147356865636/
Topics Include: Social Media Defined, The Good, The Bad, The Ugly, Cyber Bullying, Sexual Solicitation, Privacy, and Now What.
This is a great presentation for those working with teenagers (schools, churches, youth programs, etc.)
This is a presentation for soon to be graduates and recent post grads, given at University of British Columbia in Vancouver.
The presentation is aimed at giving people a starter set of ideas around how to dive into social media; my experience has been that the majority of <25>t using much beyond Facebook, and at that are using Facebook for social purposes. I consider there to be a blind spot that also presents a massive opportunity for these young future professionals to leverage social tools to find jobs they love, get ideas off the ground, or otherwise connect with people and communities that inspire and motivate them.
Even a blogger who have written thousand of post sometimes feels lack of ideas. I have written some tips to find ideas for writing blog posts.
For more information look here :http://presentslide.org/2016/07/finding-ideas-for-your-next-blog-post/
The Keeper of Secrets: The Dance of Community LeadershipLeslie Hawthorn
This talk was delivered as the closing keynote at the FOSDEM 2013 Conference.
Video is available at http://video.fosdem.org/2013/maintracks/Janson/The_Keeper_of_Secrets.webm
This content is licensed CC-By-3.0, so please use, remix and share widely!
Abstract:
Leaders in communities that value openness and transparency are faced with a difficult challenge: people confide in you constantly, but your role as a leader is to promote positive change in your project; change only proceeds where information flows. How does one negotiate the need to maintain trust and harmony in the human sides of our interactions in development communities, while still ensuring that the social problems that may inhibit community progress are mitigated? How does one manage to do all this while keeping one’s commitments to one’s friends and to project values like transparency and openness?
In this talk, Leslie Hawthorn will explore the role of secrets and disclosure in our open development communities. Specifically, she will explore how good leaders know when to discuss secrets, when to remain mum and, in particular, how to tell secrets "the right way". Drawing on six years of experience working with 100s of FOSS communities, she will discuss some of the most contentious and hilarious social problems she’s encountered and how they were addressed, with names and details omitted sufficiently well to keep her own commitments to confidentiality.
An amalgamation of Social Media stats and info along with some examples of the good and the bad. And of course what it means for the way organisations talk to customers.
Presentation for Power on your career by listening to industry experts at Microsoft Sri Lanka - YouthSpark Live 2016.
Via: https://www.facebook.com/MicrosoftSL/photos/gm.1794889820798558/1498147356865636/
Topics Include: Social Media Defined, The Good, The Bad, The Ugly, Cyber Bullying, Sexual Solicitation, Privacy, and Now What.
This is a great presentation for those working with teenagers (schools, churches, youth programs, etc.)
This is a presentation for soon to be graduates and recent post grads, given at University of British Columbia in Vancouver.
The presentation is aimed at giving people a starter set of ideas around how to dive into social media; my experience has been that the majority of <25>t using much beyond Facebook, and at that are using Facebook for social purposes. I consider there to be a blind spot that also presents a massive opportunity for these young future professionals to leverage social tools to find jobs they love, get ideas off the ground, or otherwise connect with people and communities that inspire and motivate them.
Design Patterns in Social Media: The Hero's Journey will be Twitter-edEd Schipul
Sarasota Design Summit - how to utilize Twitter and other Social Media tools to tell your Story, discover and grow your Characters and further your Plot.
Context: this presentation comprises slides used in an assembly presentation first delivered in February 2015. The target audience was Year 9 (aged 13 and 14) but may well be used with other teenage audiences. I do not show the first slide included here; I start with the first image as the audience settles. I ask if anyone spots something unusual about it, and when the horns in the shadow are noted, I say that this will make sense later.
The first section refers back to another assembly which I have delivered to many of the same students in Year 7 (aged 11 and 12) (http://www.slideshare.net/jamespenstone/digital-footprints-presentation). The early slides (safebook) are therefore a recap of common-sense advice about maintaining a positive online presence. I make it clear that social networks come and go with popularity /usage (the implied Facebook in the infographic may well not be one they use regularly).
Then the scene is set to talk specifically about issues of cyberbullying, a separate but connected strand of digital citizenship education. Speech bubbles imply discussion time for the audience (share with someone next to you), followed by volunteered answers. There is one thought bubble for individual reflection of 30 seconds or so.
Note: many videos which have been created on the topic of cyberbullying (including the ones used here) reference suicide as a potential outcome. I think it is important to give some context that this tragic outcome is actually rare and certainly not inevitable. It is important to address as a potential outcome, but there are many other outcomes which I think an audience should give a lot of consideration to especially as some of these are, by contrast, inevitable. So I do not dwell on the endings of some of the youtube clips shared here.
The most powerful video is the animated poem by Shane Koyzcan. Before playing, I emphasise that Shane uses the metaphor of ‘troll’ for cyberbullies, as opposed to the related but sometimes different use of the word online. It is worth allowing a few moments of quiet reflection immediately after it has played. I choose to draw out that (a) it is useful to hear the passion/anger/frustration of someone who has received bullying, as it makes us recognise the possible impact much more and (b) that no one person is actually the portrayed troll themselves but that their actions (intentional or otherwise) might take on the powerful metaphor. Hence the follow up question (which without this context seems a bit ambiguous). One of the best answers seems to me to be to empathise, referring back to earlier discussion on why it happens (one reason being that a bully is removed from the victim and can not see their impact).
After some appropriate responses, the presentation ends with a positive statistic from the recent survey in Canadian schools (and one which contradicts the 90% statistic). I think this is a useful way to end, as well as referring back to the choices we
Bill White Campaigners' Social Media TrainingEd Schipul
We had a great session with Mayor Bill White's volunteer Social Media training. We touched on the concept of Storytelling through social networks, tools to listen and engage with and appropriate ways to respond to comments and negativity.
Thanks to Andrea White, Mustafa Tameez and Monica Danna - as well as Marc Nathan at the HTC. We really appreciated the opportunity.
MI Social Media & Prevention: Getting StartedLaDonna Coy
An introduction to social media in prevention, why it is important, how to get started, plus a little explore/discover stories. Delivered online via Elluminate.
Presentation given at the 9 May 09 CareerExpo, Stamford, CT.
- Discover the hidden job market through social media.
- Craft a job search campaign that exploits social media.
- Manage your reputation in a hard-to-control virtual world.
Productive Games: Using Game Mechanics to Steer Human BehaviorKevin Lim
I'm interested in how game mechanics acts as a form of architecture that doesn't necessary focus on restriction, but rather stimulates specific behaviors. From video games to real-world settings such as classrooms, we can be steered towards socially productive ends, e.g. to override tragedy of the commons.
Similar to Social Media: The Bad and The Ugly at Blog World & New Media Expo 2009 (19)
Managing Abusive Online Community Members (or "The Mean Things People Say to ...Patrick O'Keefe
During this lighthearted presentation, I shared some of the many mean things that members of my online community have said to me in my role as a moderator and community manager.
We can all have a laugh at that, but over the years, I've also developed a process for handling them and ensuring that the impact of them on my staff is minimized.
These funny comments serve as the narrative for those practical lessons.
In this presentation for Arizona State University, I'll provide tips for students on how to grow your online forums in the pre-launch and initial post-launch stages. We'll also discuss complementary subjects, such as leading a team of moderators and where forums fit in the world of social media.
This talk will conclude with questions and a live review of the class forums, in an effort to help you complete the class project successfully.
Unfortunately, due to SlideShare's poor compression, this presentation looks very jagged. For what it actually looks like, please see: https://speakerdeck.com/patrickokeefe/an-introduction-to-monetizing-your-website
When people think about monetizing a website, they often think about display advertising – and for good reason. It is a mature medium with many companies and services that exist to support it. But there is so much more.
In this session, we will briefly introduce the myriad of methods that are available to you, discuss how to get started, share tips on how to move past the starting gate and name some of the vendors that you can work with.
Since there are several methods to discuss, I aim to give you an idea of what is out there and how you can get to work, allowing you to do further research into the methods that speak to you.
Online Community Management at CNN TechTuesdaysPatrick O'Keefe
In this session for CNN and Turner staff members held at their headquarters in Atlanta, Georgia,, I discussed what an online community manager does and why you should care about online community building, even if you don't want to be a community manager or work in digital.
Online Community Building at Social Media Masters Los AngelesPatrick O'Keefe
These slides are from my "Online Community Building" presentation for the Social Media Masters conference series in Los Angeles (September 9) and Kansas City (October 21).
The question isn’t whether or not you have a community. Your community – the people who love and support what you do – is out there. The question is how you engage with them. In this workshop, we’ll talk about community management and engagement in spaces you control and spaces you don’t, from Facebook and Twitter to forums and blogs. This is the art of community building on the web, both the good and the bad, steeped in real world experience.
Online Community Building at Social Media Masters AtlantaPatrick O'Keefe
These slides are from my "Online Community Building" presentation for the Social Media Masters Atlanta in Marietta, GA on August 26.
The question isn’t whether or not you have a community. Your community – the people who love and support what you do – is out there. The question is how you engage with them. In this workshop, we’ll talk about community management and engagement in spaces you control and spaces you don’t, from Facebook and Twitter to forums and blogs. This is the art of community building on the web, both the good and the bad, steeped in real world experience.
Comment Moderation 201 at WordCamp Raleigh 2011Patrick O'Keefe
These slides are from the "Comment Moderation 201" solo presentation that I delivered at WordCamp Raleigh 2011.
Part strategy, part technology, this talk was aimed at moving beyond beginning concepts of moderation, like spam filters and default functionality in WordPress and to talk about how to take your comment moderation to the next level.
27 (Fun!) Ways to Kill Your Online Community at South by Southwest Interactiv...Patrick O'Keefe
These slides were for "27 (Fun!) Ways to Kill Your Online Community," a solo presentation I delivered at South by Southwest Interactive 2011 on March 13 in Salon K at the Hilton in Austin, TX.
As part of the presentation, I discussed 27 ways, beliefs and tactics that would help you to kill your online community as quickly as possible.
You could always take these thoughts and do the opposite and not kill your community, but why would you want to do that?
Marketing Yourself as a Freelancer in an Online Community at indieconf 2010Patrick O'Keefe
These slides are from a solo presentation I delivered at indieconf on November 13, 2010 in Raleigh, North Carolina.
I shared the power of online communities and how they can be tapped into to grow your business and your client list.
How to Market Your Stuff to Online Forums and Communities at Podcamp Topeka 2010Patrick O'Keefe
These slides are from the keynote presentation that I delivered at Podcamp Topeka on November 6, 2010 in Topeka, Kansas.
We discussed tactics and strategies that you can use to tap into the power of online community. Not communities run by you, necessary, but communities run by others.
I also highlighted some tactics for building community on Twitter and Facebook and shared research data that spoke to the power of online community when it comes to influencing people.
Ethics and Social Media Marketing at BlogWorld & New Media Expo 2010Patrick O'Keefe
These slides are from the "Ethics and Social Media Marketing" panel at BlogWorld & New Media Expo 2010. It was delivered on October 16, 2010 in Las Vegas, Nevada.
Joining me on the panel was Brandon Eley, Jason Baer and Jeremy Wright.
We discussed the importance of ethical social media marketing, including the tenets of both ethical and unethical campaigns.
Among other topics were the selection of a digital agency and ensuring that the agency represents you in an ethical and responsible manner.
I'm Nothing Without My Fans at BlogWorld & New Media Expo 2010Patrick O'Keefe
These slides are from the "I'm Nothing Without My Fans" panel at BlogWorld & New Media Expo 2010. It was delivered on October 15, 2010 in Las Vegas, Nevada.
I was joined on the panel by Asher Roth, D.A. Wallach and Wayne Sutton.
We discussed the art of building meaningful fan relationships online and through social media. Our focus was on the music industry, but with lessons that could be applied to other industries, as well.
Personal Branding & How to Break Into Social Media at ConvergeSouth 2010Patrick O'Keefe
These slides are from a dual presentation titled "Personal Branding & How to Break Into Social Media." I delivered it with Wayne Sutton at ConvergeSouth 2010 in Greensboro, North Carolina on October 1, 2010.
It was an introductory to intermediate talk on the power of building a personal brand and how to do so. We discussed how we built our brands and how we maintain them on a day to day basis.
Jack Bauer's Guide to Managing Online Communities at Modern Media Man Summit ...Patrick O'Keefe
These slides are from a solo presentation I delivered at Modern Media Man Summit (M3 Summit) in Atlanta, GA on September 10, 2010.
I discussed some community management lessons that we can learn from Jack Bauer, the lead character on the Fox television show, "24."
Advertising and the Social Web: Can it Work? at Social Media Business Forum 2009Patrick O'Keefe
These slides were used at the "Advertising and the Social Web: Can it Work?" panel at Social Media Business Forum 2009.
The panel also featured David Millsaps and Gregory Ng.
We discussed advertising and marketing and how to best approach those endeavors in the social media.
The Art of Responding to Feedback from Your Community at South by Southwest I...Patrick O'Keefe
These slides were used at my "The Art of Responding to Feedback from Your Community" solo presentation (book reading for "Managing Online Forums") at South by Southwest Interactive (SXSW) 2009.
I discussed my 3 simple steps for responding to feedback from you receive from your community.
Promoting Your Blog Through Social Media at the Independent Blogging Conferen...Patrick O'Keefe
These slides were used at my "Promoting Your Blog Through Social Media" solo presentation at the Independent Blogging Conference at Greensboro 2008.
I provided tips on how and how not to approach the promotion of your blog through five key forms of social media: blogging, microblogging, social networking, social bookmarking and forums.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
7. Let’s pretend she’s trying to cut in line. In other words, she feels entitled to cut. You try finding a photo for “self entitlement.” Self Entitlement
9. Want to come to my poker tournam -err, I mean, a poker tournament that I saw somewhere? Sock Puppets Photo Credit: http://www.flickr.com/photos/cfinke/ / CC BY-NC-SA 2.0