The document discusses key debates around social software in enterprises. It addresses questions like whether social software can consistently provide ROI, the roles and responsibilities of community managers, whether to invest in social software platforms or socialize existing tools, and whether intranets should have communities or be communities. For each debate, arguments are presented on both sides, with the conclusion that the answers often depend on specific enterprise needs and contexts.
Telligent - Secrets To Building Sustainable Online CommunitiesTelligent
While there are huge benefits to an online community, at least 70 percent fail. Yet despite this failure rate, leading communities aren't just surviving; they are thriving. What sets these communities apart from the rest? How can you sustain an online community that provides a competitive edge?
Now you can learn the secrets of a successful community, including:
The most common fallacies of online communities
The importance of getting beyond the technology to strategy
The impact of the community life cycle
The benefits of harnessing user generated knowledge
Join Telligent founder and CTO Rob Howard for How to Build a Sustainable Online Community, and walk away with practical, action-oriented insights to help you transform your community from stale to effective.
DSE2011 S29 - Using Mobile, Touch and Other Interactive Technologies to Validate User Engagement and Campaign Effectiveness
The 10 Biggest Problems and Solutions for DOOH Networks Flirting with Social Media and Mobile Applications
Learn The Characteristics Of World Class CommunitiesTelligent
Today, everything is social. It’s the most revolutionary change in business since the introduction of email. Social is the “new normal” – every business has to have it. So why is it that some social strategies thrive while others wither and die?
Once you remove the shiny wrapper, there is an incredible amount of depth and value in using community software as a way to reach your customers. Join Telligent CTO Rob Howard and Sr. Director of Strategy Cecilia Edwards for their ground-breaking webinar, Learn the Characteristics of World Class Communities. Take this opportunity to hear expert views on how to transform your community from stale to “world class”, including how to:
Identify business objectives
Leverage the wisdom of the crowd
Provide privileged membership
View these slides to learn how your organization can build a world-class community.
This was the University of Minnesota's 2007-2008 National Student Advertising Competition plans book. I was an art director for the team, where my main focus was writing and planning out the television commercial.
Telligent - Secrets To Building Sustainable Online CommunitiesTelligent
While there are huge benefits to an online community, at least 70 percent fail. Yet despite this failure rate, leading communities aren't just surviving; they are thriving. What sets these communities apart from the rest? How can you sustain an online community that provides a competitive edge?
Now you can learn the secrets of a successful community, including:
The most common fallacies of online communities
The importance of getting beyond the technology to strategy
The impact of the community life cycle
The benefits of harnessing user generated knowledge
Join Telligent founder and CTO Rob Howard for How to Build a Sustainable Online Community, and walk away with practical, action-oriented insights to help you transform your community from stale to effective.
DSE2011 S29 - Using Mobile, Touch and Other Interactive Technologies to Validate User Engagement and Campaign Effectiveness
The 10 Biggest Problems and Solutions for DOOH Networks Flirting with Social Media and Mobile Applications
Learn The Characteristics Of World Class CommunitiesTelligent
Today, everything is social. It’s the most revolutionary change in business since the introduction of email. Social is the “new normal” – every business has to have it. So why is it that some social strategies thrive while others wither and die?
Once you remove the shiny wrapper, there is an incredible amount of depth and value in using community software as a way to reach your customers. Join Telligent CTO Rob Howard and Sr. Director of Strategy Cecilia Edwards for their ground-breaking webinar, Learn the Characteristics of World Class Communities. Take this opportunity to hear expert views on how to transform your community from stale to “world class”, including how to:
Identify business objectives
Leverage the wisdom of the crowd
Provide privileged membership
View these slides to learn how your organization can build a world-class community.
This was the University of Minnesota's 2007-2008 National Student Advertising Competition plans book. I was an art director for the team, where my main focus was writing and planning out the television commercial.
At SXSW there was no one key trend - as Bruce Springsteen said there was instead a set of "key notes". This presentation has a look at the five key macro trends and 10 key sub-trends that lay under these.
2011 10-05 lithium -likes to love london v slide-shareMichael Wu PhD
Turn your Facebook “Likes” into “Loves” by turning your fans into superfans.
1. Turn your connections into actions and interaction via gamification
2. Turn the actions and interactions into tangible ROI via influence and loyalty
3. Build strong customer relationship in communities and spread WOM through social networks
2011 10-04 lithium -likes to love amsterdam v slide-shareMichael Wu PhD
Turn your Facebook “Likes” into “Loves” by turning your fans into superfans.
1. Turn your connections into actions and interaction via gamification
2. Turn the actions and interactions into tangible ROI via influence and loyalty
3. Build strong customer relationship in communities and spread WOM through social networks
A presentation made by Janette Toral at the "Business Review: Highlights and Foresights" event last January 31, 2012 at AIM Acceed Conference Center. The event was organized by the Asian Centre for Enterprise Development (http://ascendph.com).
Presentation by Clara Shih, Aughor of "The Facebook Era" and CEO of Hearsay Labs at Enterprise 2.0 San Francisco 2009. Focused on business in an era of Twitter, Facebook and Unified Communications.
Thank God It’s Friday ! This week: Jean-Claude Van Damme, Hibiki, Into The Storm, Samsung, Kitt, David Hasselhoff, Renault, Tag Heuer, Scrabble, Joris Delacroix - Air France
At SXSW there was no one key trend - as Bruce Springsteen said there was instead a set of "key notes". This presentation has a look at the five key macro trends and 10 key sub-trends that lay under these.
2011 10-05 lithium -likes to love london v slide-shareMichael Wu PhD
Turn your Facebook “Likes” into “Loves” by turning your fans into superfans.
1. Turn your connections into actions and interaction via gamification
2. Turn the actions and interactions into tangible ROI via influence and loyalty
3. Build strong customer relationship in communities and spread WOM through social networks
2011 10-04 lithium -likes to love amsterdam v slide-shareMichael Wu PhD
Turn your Facebook “Likes” into “Loves” by turning your fans into superfans.
1. Turn your connections into actions and interaction via gamification
2. Turn the actions and interactions into tangible ROI via influence and loyalty
3. Build strong customer relationship in communities and spread WOM through social networks
A presentation made by Janette Toral at the "Business Review: Highlights and Foresights" event last January 31, 2012 at AIM Acceed Conference Center. The event was organized by the Asian Centre for Enterprise Development (http://ascendph.com).
Presentation by Clara Shih, Aughor of "The Facebook Era" and CEO of Hearsay Labs at Enterprise 2.0 San Francisco 2009. Focused on business in an era of Twitter, Facebook and Unified Communications.
Thank God It’s Friday ! This week: Jean-Claude Van Damme, Hibiki, Into The Storm, Samsung, Kitt, David Hasselhoff, Renault, Tag Heuer, Scrabble, Joris Delacroix - Air France
The Ex-CXO: Why Your Employees Will be Running Your Enterprise in 5 Years, an...Enterprise 2.0 Conference
Sara M. Roberts, Book Author and President & CEO, Roberts Golden Consulting, Keynote Address from the Enterprise 2.0 Conference in Boston 2011.
The mandate for today’s enterprise is adapting itself to the millions of decisions made every day by its employees—the key people on the ground who are seeing operational short-cuts and competitive advantage in real time. Enterprises must embrace this sea change, driven by ever more democratic collaboration and communications tools, and prepare to support, adapt, and leverage the wisdom of the many.
Bert Sandie, Director, Learning & Development, Electronic Arts, Inc's Keynote Address at the Enterprise 2.0 Conference in Boston 2011.
Using real-world experiences to demonstrate the critical importance of why culture and employee behaviors need our full attention to full leverage collaboration and knowledge sharing inside our organizations.
Social Intelligence a case for Bunnings HardwareiGo2 Pty Ltd
This overview shows why organisations like Bunnings (B2C) must Listen and build their own communities to engage and support customers.
Not to mention the kids planking in their stores.
Digital Engagement: 5 Steps to Build, Analyze & Measure Your Digital Engageme...SnapApp
In today’s digital world, customers and fans demand engagement across channels; but most companies still struggle with a comprehensive strategy that combines the content, involvement & acquisition tactics required to do so. See examples that any business can use to build a strategy that fuels growth.
Originally delivered at Oracle Social Business Seminar - for more information on becoming a Certified Information Professional, go to http://www.aiim.org/certification.
Presentation at International Housewares Association March 3, 2013Digital Inbound
This was presented at the International Home + Housewares Show on March 3, 2013, at the Innovation Theater in the Lakeside Center. The talk titled "Social Technologies and Digital Marketing" give insight into the many social technologies that a company may use as part of the their marketing plan. Companies must be prepared to embrace these social technologies to insure they are using Social Media to their best advantage. Each company needs to properly plan so that their organizational voice can be heard consostently across all of a companies Internet properties.
This presentation provides examples of how social media tools such as blogs, LinkedIn and Twitter can be used to market/sell your business. But social media has implications beyond marketing and sales. It impacts PR, HR, IT and more.
Lee Bryant, Co-founder and Director, Headshift, Keynotes at the Enterprise 2.0 Conference in Boston 2011.
Social media monitoring and listening has become a hot topic recently, but cutting through the noise to identify actionable insights is not easy, and current practice often goes no further than the marketing department. This talk will look at how social analytics can leverage internal networks to make sense of customer insights and help drive business improvement.
Pulling It Together: Connecting External Activities With Internal ConversationsEnterprise 2.0 Conference
Ming Kwan, Global Digital Marketing Manager, Nokia's Keynote address at the Enterprise 2.0 Conference in Boston 2011.
Social activities in organizations are currently focused on three, distinct, areas. Internal – Enterprise 2.0, External – consumer engagement and Partner collaboration. This has led to different parts of our organization working on their own social initiatives, creating social silos. We are now connecting insights from our external activities with internal systems to reap the benefits of ownership, visibility & transparency.
John Hagel, The Power of Pull and Co-Chairman, Center for the Edge, Deloitte & Touche's Keynote presentaion from Enterprise 2.0 Conference in Boston on June 21, 2011.
The successful transition to Enterprise 2.0 hinges on explicitly tying social software deployments to performance metrics that matter. But these metrics have an even more powerful, second-order effect: they foster passion among participants in ways that accelerate learning and performance improvement. Weaving together performance and passion gives companies a significant advantage in a world of steadily increasing economic pressure.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886