GOSHO is launching an app to allow users to view and rate photos and videos from music festivals and concerts tagged with hashtags. Users will rate media on aesthetic criteria like artistic quality, clarity, and color. The highest rated media will be featured in the app for other users to view and share. The goal is for GOSHO to become a comprehensive media company hosting a weekly YouTube show with festival footage and interviews, shared with app users. The app aims to build a community of music lovers inspired to make positive change.
Social by Design: 10 best practices to build Facebook applications Tigerlily
At Tigerlily, we integrate social features from the very first steps of design. Because Facebook is just like everyday life.
Discover 10 best practices to integrate in order to be successful on Facebook.
Airbnb has run several successful social media marketing campaigns in recent years:
1) The #WeAreHere campaign live streamed films from 6 cities on 5 continents over 24 hours on Facebook to promote their new app, resulting in over 6 million global participants in the first 24 hours and increases in brand recall and favorability.
2) The #OneLessStranger campaign gifted $1 million to customers to perform acts of kindness and share their experiences on social media to connect strangers, generating over 3 million engagements in 3 weeks.
3) The #WeAccept Super Bowl ad promoting acceptance of refugees was viewed 19 million times and shared over 100,000 times, becoming the #1 used hashtag during
Facebook sweepstakes promotion to build awareness and interest towards the launch of Royal Caribbean’s new cruise ship.
Developed by Chat Social Media Agency, www.chatagency.com.
The document provides information and discussion questions about the marketing of Disney's 1967 and 2016 adaptations of The Jungle Book. It discusses various above and below the line marketing strategies used for both films, including posters, trailers, merchandise, social media campaigns, cross-promotional partnerships, and targeting specific demographics. Students are prompted to analyze the posters and trailers in terms of how media language constructs representations of characters, events, and audiences.
Legador uae branding & regional communication strategyElina_Dutta
This document outlines a branding and communication strategy for Legador Ocean Heroes pasta. It recommends positioning the brand as fun, innovative, and engaging consumers through imagination. The strategy involves creating characters, a jingle, and slogan ("Your imagination is your only limitation") to build excitement. Execution ideas include animated ads, school promotions, contests, and extensive branding across media to make Legador a leading regional pasta brand through creativity and engaging consumers' sense of adventure.
The document describes a campaign poster created for a "Dirty Dozen" campaign. The poster will feature a collage of trash and litter found on beaches, depicting the items as coming from the viewer. This is intended to raise awareness of the trash left by companies on the dirty dozen list and encourage the public to properly dispose of waste. The poster aims to change perceptions of beaches as places for trash and motivate people to pick up after themselves.
GOSHO is launching an app to allow users to view and rate photos and videos from music festivals and concerts tagged with hashtags. Users will rate media on aesthetic criteria like artistic quality, clarity, and color. The highest rated media will be featured in the app for other users to view and share. The goal is for GOSHO to become a comprehensive media company hosting a weekly YouTube show with festival footage and interviews, shared with app users. The app aims to build a community of music lovers inspired to make positive change.
Social by Design: 10 best practices to build Facebook applications Tigerlily
At Tigerlily, we integrate social features from the very first steps of design. Because Facebook is just like everyday life.
Discover 10 best practices to integrate in order to be successful on Facebook.
Airbnb has run several successful social media marketing campaigns in recent years:
1) The #WeAreHere campaign live streamed films from 6 cities on 5 continents over 24 hours on Facebook to promote their new app, resulting in over 6 million global participants in the first 24 hours and increases in brand recall and favorability.
2) The #OneLessStranger campaign gifted $1 million to customers to perform acts of kindness and share their experiences on social media to connect strangers, generating over 3 million engagements in 3 weeks.
3) The #WeAccept Super Bowl ad promoting acceptance of refugees was viewed 19 million times and shared over 100,000 times, becoming the #1 used hashtag during
Facebook sweepstakes promotion to build awareness and interest towards the launch of Royal Caribbean’s new cruise ship.
Developed by Chat Social Media Agency, www.chatagency.com.
The document provides information and discussion questions about the marketing of Disney's 1967 and 2016 adaptations of The Jungle Book. It discusses various above and below the line marketing strategies used for both films, including posters, trailers, merchandise, social media campaigns, cross-promotional partnerships, and targeting specific demographics. Students are prompted to analyze the posters and trailers in terms of how media language constructs representations of characters, events, and audiences.
Legador uae branding & regional communication strategyElina_Dutta
This document outlines a branding and communication strategy for Legador Ocean Heroes pasta. It recommends positioning the brand as fun, innovative, and engaging consumers through imagination. The strategy involves creating characters, a jingle, and slogan ("Your imagination is your only limitation") to build excitement. Execution ideas include animated ads, school promotions, contests, and extensive branding across media to make Legador a leading regional pasta brand through creativity and engaging consumers' sense of adventure.
The document describes a campaign poster created for a "Dirty Dozen" campaign. The poster will feature a collage of trash and litter found on beaches, depicting the items as coming from the viewer. This is intended to raise awareness of the trash left by companies on the dirty dozen list and encourage the public to properly dispose of waste. The poster aims to change perceptions of beaches as places for trash and motivate people to pick up after themselves.
Social Media Best Practice: Goethe-InstitutiCrossing GmbH
The Goethe-Institut campaign "German Jungle – Twist your tongue" aimed to promote interest in learning German across 9 countries. Over 11,000 participants uploaded 167 videos that received over 137,000 views. Winners from the Middle East and USA won trips to Berlin and language courses. Through Facebook ads and events, the campaign gained 29,000 new fans, increasing Goethe-Institut's total by 220%. The campaign was successful in engaging participants and growing Goethe-Institut's online audience across multiple countries.
Eristoff Invasion - APAC local success storyFacebook
The promoter of a music festival in India called Eristoff Invasion was able to achieve a 30x return on investment from their Facebook advertising spend. They sold over 10,500 tickets directly through Facebook ads, with 35% of ticket buyers being invited by a Facebook friend. By creating a Facebook page and running targeted ads, the promoter was able to significantly increase awareness of the event, drive ticket sales, and engage fans both before and after the festival.
Ice cream can also trend on social media if it's mixed in equal proportions of sugar and sense. Havmor's latest friendship day campaign teaches how Ice cream lovers walk Ice cream and talk Ice cream.
Volkswagen maintains a strong presence on major social media platforms like Facebook, Twitter, YouTube and LinkedIn where they engage customers by sharing company updates, promotions and answering questions, while also using platforms like Twitter to listen to customer feedback and address any issues. They promote their 'Innovations for Everyone' program across social media and leverage viral content and contests to build excitement around new models and drive customers to dealerships.
How did you attract/address your audience? morgangreen142
The document discusses how the author attracted and addressed their target audience for their music magazine ND. They aimed the magazine at 15-30 year olds interested in indie music. On social media, they promoted indie bands and singers to gain interest. The magazine included conventions like interviews to connect readers to artists. They featured up-and-coming singer Theo Lexis with photos taken in Camden, a popular indie location. Design elements like a large colorful logo and cover photo of singer Sophie were used to attract readers based on conventions of other music magazines.
Flash Mob which became very common these days was first used for the promotion of jassi jassi koi nahi.
TRP war b/w sony & star plus is also the highlight of the case/ppt
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Social Media Best Practice: Goethe-InstitutiCrossing GmbH
The Goethe-Institut campaign "German Jungle – Twist your tongue" aimed to promote interest in learning German across 9 countries. Over 11,000 participants uploaded 167 videos that received over 137,000 views. Winners from the Middle East and USA won trips to Berlin and language courses. Through Facebook ads and events, the campaign gained 29,000 new fans, increasing Goethe-Institut's total by 220%. The campaign was successful in engaging participants and growing Goethe-Institut's online audience across multiple countries.
Eristoff Invasion - APAC local success storyFacebook
The promoter of a music festival in India called Eristoff Invasion was able to achieve a 30x return on investment from their Facebook advertising spend. They sold over 10,500 tickets directly through Facebook ads, with 35% of ticket buyers being invited by a Facebook friend. By creating a Facebook page and running targeted ads, the promoter was able to significantly increase awareness of the event, drive ticket sales, and engage fans both before and after the festival.
Ice cream can also trend on social media if it's mixed in equal proportions of sugar and sense. Havmor's latest friendship day campaign teaches how Ice cream lovers walk Ice cream and talk Ice cream.
Volkswagen maintains a strong presence on major social media platforms like Facebook, Twitter, YouTube and LinkedIn where they engage customers by sharing company updates, promotions and answering questions, while also using platforms like Twitter to listen to customer feedback and address any issues. They promote their 'Innovations for Everyone' program across social media and leverage viral content and contests to build excitement around new models and drive customers to dealerships.
How did you attract/address your audience? morgangreen142
The document discusses how the author attracted and addressed their target audience for their music magazine ND. They aimed the magazine at 15-30 year olds interested in indie music. On social media, they promoted indie bands and singers to gain interest. The magazine included conventions like interviews to connect readers to artists. They featured up-and-coming singer Theo Lexis with photos taken in Camden, a popular indie location. Design elements like a large colorful logo and cover photo of singer Sophie were used to attract readers based on conventions of other music magazines.
Flash Mob which became very common these days was first used for the promotion of jassi jassi koi nahi.
TRP war b/w sony & star plus is also the highlight of the case/ppt
Similar to Sofia Nizharadze Facebook Case Study (6)
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
1. Advertising Case Study
Sofia Nizharadze/ Facebook Executive Summary
Eurovision Client:
Company Background
Sofia Nizharadze is a Georgian singer, actress
and songwriter who represented Georgia in the
Eurovision Song Contest 2010 in Oslo with the
song Shine. Started in 1956, the contest is an
annual competition held among active member
countries of the European Broadcasting Union. Sofia Nizharadze
Members of the public from these countries are facebook.com/nizharadzesofia
able to cast votes for their favorite song, making
Agency:
it one of the most-watch non-sporting events
Gülseren Arslan
in the world. Gülseren Arslan is the co-founder
of adnboost, a digital media agency based in Objective:
To raise awareness of a singer from
Istanbul.
Georgia competing in the Eurovision
Song Contest and to drive people to
Objective
vote for her
When Sofia approached Gülseren in early
Solution:
2010 about running a campaign on Facebook A Facebook Ads campaign launched
to promote her bid to win the Eurovision in 32 countries and 18 languages
Song Contest, she had several key objectives. driving to videos of the singer
performing her Eurovision song
The main goal involved encouraging people
on Facebook to become fans of the Sofia Key Lessons:
Nizharadze Facebook Page and to watch the • Facebook can provide an effective
video of the artist performing her song. By and cost-efficient platform to
launch a global campaign to raise
advertising in 32 countries through Facebook,
awareness
the hope was ultimately to drive people to vote
for Sofia’s Shine as their favorite song in the • Facebook fans can be valuable to
a brand as they are more likely
contest.
to take actions than people who
have not already like a brand
“There was something magical about this campaign. I’ve
worked with many different ad platforms. But this one
enabled me to achieve big success globally on a small
budget. I was really impressed.”
Gülseren Arslan, Co-Founder, adnboost
2. Advertising Case Study
Approach
rather broad reflecting Eurovision’s broad
Given Facebook’s global reach, Gülseren ran
viewership. “We really wanted to reach everybody,
Marketplace Ads in some 32 key countries where
not just people who listed Eurovision in their Likes
people could vote on their favorite song for the
and Interests,” she says. She modified the targeting
Eurovision Contest. She created ads in some 18
parameters in each country to reach the right
different languages, including Georgian, Russian,
audience.
English, German and Norwegian.
The first phase, which began a month before the Results
contest final on May 29, 2010, was focused on
building awareness of the artist and gaining fans • Sofia made it into the semifinals (some 25
for her Page. There, people could discover content out of a total of 39 contestants and finished
about the singer, including a link to her performing the contest in a highly respectable 9th place.
Shine. The Like Ads featured a picture of Sofia and “Georgia is a small country,” Gülseren says.
encouraged people to “Get to know her better” by “Nobody was expecting results like that”
clicking on it.
• Over the course of the month-long campaign,
The second phase, some three weeks before the the number of fans increased from 200 to more
final, featured another ad with new text asking than 80,000. The Page now has more than
people to listen to “one of the most powerful voices 103,000 fans, giving the artist a substantial
in Eurovision.” It drove directly to the Shine video, so base of people with whom to engage and share
people could watch it and share it with their friends. feedback from
“We wanted the content to be fun and for people to
• The video of Sofia’s song Shine was viewed
watch the video,” says Gülseren.
more than 580,000 times
• The ads were viewed more than 428 million
times
• People clicked on the ads more than 379,000
times
“There was something magical about this
campaign,” says Gülseren. “I’ve worked with many
different ad platforms. But this one enabled me to
achieve big success globally on a small budget. I
was really impressed.”
The Future
The final phase ran on the eve of the final and was Gülseren plans to continue using Facebook
focused on driving action: getting people to vote for advertising with her clients and plans to make
Sofia. It featured an ad stating the number to use Facebook the main advertising platform for her
to vote for Sophia and sought to motivate people media agency. As for Sofia, she continues to use her
by suggesting “let’s SHINE together.” Throughout Facebook Page to engage with her fans and keep
the campaign, Gülseren deliberately kept targeting them posted on her career.