Presentation for AARP DSO Online Marketing Summit 2013 (Also for What's Next ...Mike Lee
[I also presented a version of this at the What's Next Boomer Business Summit 2013 in Chicago. If you attended that early morning session, thank you!]
For whatever reason, three of the embedded videos refuse to play. Here are the links:
After Slide 13 -
Pay with Square - The Motley Fool
http://youtu.be/8pJOVOtJpoc
After Slide 17 -
Say hello to the Age UK My Phone
http://youtu.be/RmTDjZnigj8
After Slide 19 -
CNET report on Leap Motion
http://youtu.be/MYgsAMKLu7s
Aarp dso mktg_summit_25_jan2013_v2_slideshare.ppt
PR Newswire Event Chicago September 2009 - Industries In Flux: Meida and Pub...Michael Pranikoff
Presentation by Michael Pranikoff, PR Newswire Director of Emerging Media - for the PR Newswire Chicago event on September 24, 2009 - Industries in Flux: Media and Public Relations & the Impact of Social Media
Bryan Dove - From “Can We?” to “Should We?”: Emerging Challenges in Consumer ...Turing Fest
The science fiction writer William Gibson once said, “The future is already here – it’s just not very evenly distributed.” Companies like Google, Amazon, and Facebook are investing billions to advance deep learning technologies and bringing science fiction to their billions of users. They are also giving away most of the infrastructure and algorithms that they create for free, allowing businesses across the world to get in on the AI action. The availability of world-class AI research is arriving at an incredible pace and can be deployed for pennies. As this trend accelerates, what does that mean for the rest of us as both users and consumer product creators?
Presentation for AARP DSO Online Marketing Summit 2013 (Also for What's Next ...Mike Lee
[I also presented a version of this at the What's Next Boomer Business Summit 2013 in Chicago. If you attended that early morning session, thank you!]
For whatever reason, three of the embedded videos refuse to play. Here are the links:
After Slide 13 -
Pay with Square - The Motley Fool
http://youtu.be/8pJOVOtJpoc
After Slide 17 -
Say hello to the Age UK My Phone
http://youtu.be/RmTDjZnigj8
After Slide 19 -
CNET report on Leap Motion
http://youtu.be/MYgsAMKLu7s
Aarp dso mktg_summit_25_jan2013_v2_slideshare.ppt
PR Newswire Event Chicago September 2009 - Industries In Flux: Meida and Pub...Michael Pranikoff
Presentation by Michael Pranikoff, PR Newswire Director of Emerging Media - for the PR Newswire Chicago event on September 24, 2009 - Industries in Flux: Media and Public Relations & the Impact of Social Media
Bryan Dove - From “Can We?” to “Should We?”: Emerging Challenges in Consumer ...Turing Fest
The science fiction writer William Gibson once said, “The future is already here – it’s just not very evenly distributed.” Companies like Google, Amazon, and Facebook are investing billions to advance deep learning technologies and bringing science fiction to their billions of users. They are also giving away most of the infrastructure and algorithms that they create for free, allowing businesses across the world to get in on the AI action. The availability of world-class AI research is arriving at an incredible pace and can be deployed for pennies. As this trend accelerates, what does that mean for the rest of us as both users and consumer product creators?
ESTRUCTURA DE DATOS: MEMORIA ESTATICA
La memoria estática es la que no se puede modificar o ejecutar en momento de ejecución. También se debe conocer con anticipo el tamaño de la estructura que está en ejecución.
ITESZ
Sistemas Operativos: Unidad 6: Protección y seguridad.
Presentacion
Los mecanismos de protección controlan el acceso a un sistema limitado los tipos de acceso a archivos permitidos a los usuarios. Además, los mecanismos de protección deben garantizar que sólo los preocesos que hayan obtenido la adecuada autorización del sistemaoperativo puedan operar sobre los segmentos de memoria, CPU y otros recursos.
La protección se proporciona mediante un mecanismo que controla el acceso de los programas, de los procesos ode los usuarios a los recursos definidos por un sistema informático. Este mecanismo debe proporcionar un medio para especificar los controles que hay que imponer, junto con algún modo de imponerlos.
La seguridad garantiza la autenticación de los usuarios del sistema, con el fin de proteger la integridad de la información almacenada en el mismo (tanto datos como código), así como la de los recursos físicos del sistema informático. El sistema de seguridad impide los accesos no autorizados, la destrucción o manipulación maliciosas de los datos y la introducción accidental de incoherencias.
Ejercito Zapatista de Liberacion Nacional EZLN
Antecedentes.
TLCAN
Perspectiva general.
Nombre.
Bandera.
Ubicación.
Fundación.
Objetivos
Etapas de creación.
Ideología.
Tácticas
Principales Personajes.
Línea del tiempo.
Declaraciones.
Impacto en México.
Impacto en el mundo.
Actualmente.
Conclusiones.
Video.
Referencias
El Ejército Zapatista de Liberación Nacional (EZLN) es una organización mexicana de carácter político libertaria, que en sus inicios fue militar. Su inspiración política es el zapatismo, el marxismo y el socialismo libertario, y su estructura militar es la guerrilla. Su objetivo es, según el subcomandante Marcos, "¿La toma del poder? No, apenas algo más difícil: un mundo nuevo.”,1 y en la Declaración de la Selva Lacandona se estableció: "...lucha por trabajo, tierra, techo, alimentación, salud, educación, independencia, libertad, democracia, justicia y paz...lograr el cumplimiento de estas demandas básicas de nuestro pueblo formando un gobierno de nuestro país libre y democrático."
Procesos Ligeros: Hilos o Hebras
Un proceso ligero es una unidad básica de utilización de la CPU consistente en un juego de registros y un espacio de pila.
Comparte datos, código y registros con sus hebras pares.
Una tarea o proceso pesado esta conformado por una o mas hebras.
Una hebra solo puede pertenecer a una sola tarea.
INTERBLOQUEO (DEADLOCK)
Definicion, solucion, prevencion.
Un conjunto de procesos está en interbloqueo (un abrazo mortal, deadlock) cuando todos los procesos en ese conjunto están esperando un evento que solo puede ser causado por otro proceso en el conjunto. Los eventos a los cuales nos estamos refiriendo son concernientes con la asignación y liberación de recursos principalmente.
ITESZ
Primer Habito: Sea Proactivo
La palabra proactividad significa que somos responsables de nuestras propias vidas. Tenemos la iniciativa y la responsabilidad de hacer que las cosas sucedan. En la palabra "responsabilidad", se encuentran las palabras «responder» y «habilidad»: habilidad para elegir la respuesta. Las personas muy proactivas reconocen esa responsabilidad. La persona proactiva toma la iniciativa y está alerta para influir en las soluciones.
ITESZ
A look at Facebook's updated Open Graph protocol, including what it is, how it works, the benefits, and what you can do to start taking advantage of what Open Graph provides to enhance your marketing and advertising.
The Digital Consumption Epidemic: A story of Too Long, Didn't Read.BlairWentworth
A flipbook designed to raise awareness of the effect that digital reading has on not only our education, but our ability to read offline and in other settings as well. Glaring statistics and clear narration aim to convince the viewer that this is in fact a prevalent issue facing consumers of digital media.
Great design isn’t about beauty; it’s about knowing the right questions to ask, uncovering the right places to look, and agreeing on the right problems to solve.
At ThoughtWorks Live Australia 2016, Stephanie Rieger (Director of Design & Strategy at Yiibu) talked about three mindsets that combine design, business strategy, and technology to drive growth and embed experience design within your organisation.
ESTRUCTURA DE DATOS: MEMORIA ESTATICA
La memoria estática es la que no se puede modificar o ejecutar en momento de ejecución. También se debe conocer con anticipo el tamaño de la estructura que está en ejecución.
ITESZ
Sistemas Operativos: Unidad 6: Protección y seguridad.
Presentacion
Los mecanismos de protección controlan el acceso a un sistema limitado los tipos de acceso a archivos permitidos a los usuarios. Además, los mecanismos de protección deben garantizar que sólo los preocesos que hayan obtenido la adecuada autorización del sistemaoperativo puedan operar sobre los segmentos de memoria, CPU y otros recursos.
La protección se proporciona mediante un mecanismo que controla el acceso de los programas, de los procesos ode los usuarios a los recursos definidos por un sistema informático. Este mecanismo debe proporcionar un medio para especificar los controles que hay que imponer, junto con algún modo de imponerlos.
La seguridad garantiza la autenticación de los usuarios del sistema, con el fin de proteger la integridad de la información almacenada en el mismo (tanto datos como código), así como la de los recursos físicos del sistema informático. El sistema de seguridad impide los accesos no autorizados, la destrucción o manipulación maliciosas de los datos y la introducción accidental de incoherencias.
Ejercito Zapatista de Liberacion Nacional EZLN
Antecedentes.
TLCAN
Perspectiva general.
Nombre.
Bandera.
Ubicación.
Fundación.
Objetivos
Etapas de creación.
Ideología.
Tácticas
Principales Personajes.
Línea del tiempo.
Declaraciones.
Impacto en México.
Impacto en el mundo.
Actualmente.
Conclusiones.
Video.
Referencias
El Ejército Zapatista de Liberación Nacional (EZLN) es una organización mexicana de carácter político libertaria, que en sus inicios fue militar. Su inspiración política es el zapatismo, el marxismo y el socialismo libertario, y su estructura militar es la guerrilla. Su objetivo es, según el subcomandante Marcos, "¿La toma del poder? No, apenas algo más difícil: un mundo nuevo.”,1 y en la Declaración de la Selva Lacandona se estableció: "...lucha por trabajo, tierra, techo, alimentación, salud, educación, independencia, libertad, democracia, justicia y paz...lograr el cumplimiento de estas demandas básicas de nuestro pueblo formando un gobierno de nuestro país libre y democrático."
Procesos Ligeros: Hilos o Hebras
Un proceso ligero es una unidad básica de utilización de la CPU consistente en un juego de registros y un espacio de pila.
Comparte datos, código y registros con sus hebras pares.
Una tarea o proceso pesado esta conformado por una o mas hebras.
Una hebra solo puede pertenecer a una sola tarea.
INTERBLOQUEO (DEADLOCK)
Definicion, solucion, prevencion.
Un conjunto de procesos está en interbloqueo (un abrazo mortal, deadlock) cuando todos los procesos en ese conjunto están esperando un evento que solo puede ser causado por otro proceso en el conjunto. Los eventos a los cuales nos estamos refiriendo son concernientes con la asignación y liberación de recursos principalmente.
ITESZ
Primer Habito: Sea Proactivo
La palabra proactividad significa que somos responsables de nuestras propias vidas. Tenemos la iniciativa y la responsabilidad de hacer que las cosas sucedan. En la palabra "responsabilidad", se encuentran las palabras «responder» y «habilidad»: habilidad para elegir la respuesta. Las personas muy proactivas reconocen esa responsabilidad. La persona proactiva toma la iniciativa y está alerta para influir en las soluciones.
ITESZ
A look at Facebook's updated Open Graph protocol, including what it is, how it works, the benefits, and what you can do to start taking advantage of what Open Graph provides to enhance your marketing and advertising.
The Digital Consumption Epidemic: A story of Too Long, Didn't Read.BlairWentworth
A flipbook designed to raise awareness of the effect that digital reading has on not only our education, but our ability to read offline and in other settings as well. Glaring statistics and clear narration aim to convince the viewer that this is in fact a prevalent issue facing consumers of digital media.
Great design isn’t about beauty; it’s about knowing the right questions to ask, uncovering the right places to look, and agreeing on the right problems to solve.
At ThoughtWorks Live Australia 2016, Stephanie Rieger (Director of Design & Strategy at Yiibu) talked about three mindsets that combine design, business strategy, and technology to drive growth and embed experience design within your organisation.
Presented at CPA Congress Vic, 11 Oct 2010.
Topics:
Trust and openness, the new paradigm for engagement
The importance of people and personality
Evaluating the benefits, risks and challenges
Existing channels and new strategies
Practical examples of social media
Social Influence – Are You Doing It The Right Way? Michael Pranikoff
Social Influence – Are You Doing It The Right Way? Presentation done by PR Newswire Global Director of Emerging Media – Michael Pranikoff at a seminar put on by 3 Monkeys Communications in London on September 27, 2011.
Gamified Crowdsourcing: The Impact on Community EngagementBilal Mufti
FILM260 assignment called a FlipBook. Using inspiration through a software called HaikuDeck, I was able to create a FlipBook using PowerPoint and taking advantage of the many different design aspects embedded in the software.
I chose to create my FlipBook on how Gamified Crowdsourcing has an impact on community engagement.
Meet the Mythbusters, who will look closer at Gamification. According to Gartner, Gamification has climbed on a "peak of inflated expectations" in it's Hype Cycle. Like any new trend, gamification will move through the hype cycle and next stop is - "trough of disillusionment". Gartner predicts that by 2014, 80% of current gamified applications will fail. What can we do?
About speaker, Vladimirs Ivanovs, http://www.linkedin.com/in/vivanov
Am Consultant and Trainer, Conference Speaker and CEO, Husband and Dad :)
Resolving IT issues of any size and any kind, bringing Project Management virtue and ITIL Goodness to organisations, putting Projects/Programmes/PMOs in order, making organisations more Agile and Lean, helping to implement Changes, training serious skills through games.
Telegram is a messaging platform that ushers in a new era of communication. Available for Android, Windows, Mac, and Linux, Telegram offers simplicity, privacy, synchronization across devices, speed, and powerful features. It allows users to create their own stickers with a user-friendly editor. With robust encryption, Telegram ensures message security and even offers self-destructing messages. The platform is open, with an API and source code accessible to everyone, making it a secure and social environment where groups can accommodate up to 200,000 members. Customize your messenger experience with Telegram's expressive features.
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Your LinkedIn Success Starts Here.......SocioCosmos
In order to make a lasting impression on your sector, SocioCosmos provides customized solutions to improve your LinkedIn profile.
https://www.sociocosmos.com/product-category/linkedin/
This tutorial presentation provides a step-by-step guide on how to use Facebook, the popular social media platform. In simple and easy-to-understand language, this presentation explains how to create a Facebook account, connect with friends and family, post updates, share photos and videos, join groups, and manage privacy settings. Whether you're new to Facebook or just need a refresher, this presentation will help you navigate the features and make the most of your Facebook experience.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
This tutorial presentation offers a beginner-friendly guide to using THREADS, Instagram's messaging app. It covers the basics of account setup, privacy settings, and explores the core features such as close friends lists, photo and video sharing, creative tools, and status updates. With practical tips and instructions, this tutorial will empower you to use THREADS effectively and stay connected with your close friends on Instagram in a private and engaging way.
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEFebless Hernane
Using Google Teams (G-Teams) is simple. Start by opening the Google Teams app on your phone or visiting the G-Teams website on your computer. Sign in with your Google account. To join a meeting, click on the link shared by the organizer or enter the meeting code in the "Join a Meeting" section. To start a meeting, click on "New Meeting" and share the link with others. You can use the chat feature to send messages and the video button to turn your camera on or off. G-Teams makes it easy to connect and collaborate with others!
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyDigital Marketing Lab
Explore the latest trends in Search Engine Optimization (SEO) and discover how modern practices are transforming business visibility. This document delves into the shift from keyword optimization to user intent, highlighting key trends such as voice search optimization, artificial intelligence, mobile-first indexing, and the importance of E-A-T principles. Enhance your online presence with expert insights from Digital Marketing Lab, your partner in maximizing SEO performance.
Project Serenity is an innovative initiative aimed at transforming urban environments into sustainable, self-sufficient communities. By integrating green architecture, renewable energy, smart technology, sustainable transportation, and urban farming, Project Serenity seeks to minimize the ecological footprint of cities while enhancing residents' quality of life. Key components include energy-efficient buildings, IoT-enabled resource management, electric and autonomous transportation options, green spaces, and robust waste management systems. Emphasizing community engagement and social equity, Project Serenity aspires to serve as a global model for creating eco-friendly, livable urban spaces that harmonize modern conveniences with environmental stewardship.
2. soŸcial
netŸworkŸing
noun
the
use
of
websites
and
applicaAons
to
interact
with
other
users,
or
to
find
people
with
similar
interests
to
oneself
Image
taken
from
h.ps://flic.kr/p/e5wZ3t
3. Social
Networking
is
a
tool
that
people
use,
Image
taken
from
h.ps://flic.kr/p/oUmJH
4. All
around
the
WORLD
Image
taken
from
h.ps://flic.kr/p/93Coc9
5. For
be.er
Image
taken
from
h.ps://flic.kr/p/5UWkqe
6. As
of
2014,
72%
of
all
Internet
users
are
using
social
networking
sites,
Image
taken
from
h.ps://flic.kr/p/66Kkbk
7. Facebook
Google+
Twi.er
Instagram
Pinterest
20
million
users
150
million
users
550
million
users
1.15
billion
users
1
billion
users
Image
taken
from
Google
And
this
rate
is
growing
every
year.
8. Facebook,
Twi.er,
Instagram
and
other
networks…
Image
taken
fromh.ps://flic.kr/p/9VF4ub
Image
taken
fromh.ps://flic.kr/p/e3tpK2
Image
taken
from
Google
26. The
overuse
of
social
networking
is
a
problem
Image
taken
from
h.ps://flic.kr/p/8V7uDY
27. Image
taken
from
h.ps://flic.kr/p/s9nYr
That
must
be
addressed
in
order
to
create
28. A
be.er
future
for
our
children.
Image
taken
from
h.ps://flic.kr/p/cfY5Vu
29. References
Bullas,
J.
(2013).
48
significant
social
media
facts,
figures
and
staAsAcs
plus
7
infographics
.
Retrieved
May
20,
2014,
from
h.p://www.jeoullas.com/2012/04/23/48-‐significant-‐social-‐media-‐facts-‐figures-‐and-‐staAsAcs-‐plus-‐7-‐
infographics/
Pew
Research.
(2013).
Social
networking
fact
sheet.
Retrieved
May
20,
2014,
from
h.p://www.pewinternet.org/fact-‐sheets/social-‐
networking-‐fact-‐sheet/
Sales,
N.
(2013).
Friends
without
benefits.
Retrieved
May
20,
2014,
from
h.p://www.vanityfair.com/culture/2013/09/social-‐media-‐
internet-‐porn-‐teenage-‐girls
StaAsAc
Brain.
(2014).
Social
networking
staAsAcs.
Retrieved
May
20,
2014,
from
h.p://www.staAsAcbrain.com/social-‐networking-‐
staAsAcs/
Wood,
J.
T.
(1994).
Gendered
media:
The
influence
of
media
on
views
of
gender.
CommunicaAon,
gender,
and
culture
(pp.
231-‐244)