Did Social Media Hijack My Communications StrategyMike Smith
This presentation focuses on the challenges facing communications teams and chart viable strategies for creating an effective presence in the Web 2.0 world—punctuated by valuable lessons learned from our biggest failures. The discussion will be relevant to businesses that need to gain footing and find a path to maintain relevance in the social web.
Web 2.0 Expo speech May 6, 2010 by Charlene Li entitled, "Open Leadership: How Social Technology Can Transform How You Lead". Learn more at open-leadership.com
12 Social Media Fears and overcoming them now!New Media Lab
Social Media can be scary for those not yet engaged but show this to them and they'll be on board in a heartbeat!
We're helping improve social media by educating the masses!
Linkedin & networking in the digital ageBryan Daly
Linkedin and
Networking in the Digital Age
An overview by
Bryan Daly
What Linkedin is. and what Linkedin is not.
Some insight on how to use Linkedin as a tool to build a referral based, word of mouth business
At the end some places to learn more
Comprehensive overview of five social media tools, rules of the road and social media metrics for the Louisville chapter of the American Marketing Association.
Did Social Media Hijack My Communications StrategyMike Smith
This presentation focuses on the challenges facing communications teams and chart viable strategies for creating an effective presence in the Web 2.0 world—punctuated by valuable lessons learned from our biggest failures. The discussion will be relevant to businesses that need to gain footing and find a path to maintain relevance in the social web.
Web 2.0 Expo speech May 6, 2010 by Charlene Li entitled, "Open Leadership: How Social Technology Can Transform How You Lead". Learn more at open-leadership.com
12 Social Media Fears and overcoming them now!New Media Lab
Social Media can be scary for those not yet engaged but show this to them and they'll be on board in a heartbeat!
We're helping improve social media by educating the masses!
Linkedin & networking in the digital ageBryan Daly
Linkedin and
Networking in the Digital Age
An overview by
Bryan Daly
What Linkedin is. and what Linkedin is not.
Some insight on how to use Linkedin as a tool to build a referral based, word of mouth business
At the end some places to learn more
Comprehensive overview of five social media tools, rules of the road and social media metrics for the Louisville chapter of the American Marketing Association.
What the books about social media don't tell you Koen Delvaux
Social media campaigns are hot. Yet, it isn't about the campaign but about transforming your company into a cocreation environment where customers are part of your organization.
New Jersey Food Council Social Media PresentationHelen Levinson
Social media has experienced an explosion of growth over the last few years and has become much more than just a personal tool to have fun and stay connected; it is a vehicle that brands use to market their businesses, services and products online. But along with the benefits of using these tools lie potential pitfalls. Consider if information was leaked online and, even worse, you didn’t know it was out there. Are you prepared for serious damage control? Regularly monitoring your online reputation is crucial in protecting your brand. By following activity on social networks, blogs, message boards, and keeping an eye on YouTube videos, retailers can be aware of issues that arise, in turn respond quickly, minimizing the potential threat.
Participants will learn:
• 6 Social Media Best Practices
• Online Reputation Risk Management and Tracking
• Ways to Identify Online Threats
• YouTube Videos and Safety Control
• Compliance Issues Using Social Media
Krista Neher (www.KristaNeher.com), CEO of Boot Camp Digital (www.BootCampDigital.com) provides keynote presentations on Visual Social Media Marketing for organizations of all sizes.
This presentation covers the psychology of how our brands process visuals and images. Next, it dives into the importance of visuals in social media marketing. Having strong visuals on your website is required in the age of visual marketing. This means pinnable images on all of your web pages.
Finally the presentation includes Pinterest, Instagram and Infographics and shares actionable strategies and tips that you can implement to take your social media marketing to the next level.
This presentation is based on the bestselling book Visual Social Media Marketing (www.VisualSocialMediaMarketing) by Krista Neher.
How to convince clients, colleagues, even your boss that social media is important - by overcoming these 10 common objections you'll build a case no one can refuse!
How to Manage a Social Media Crisis explains how you can put a social media crisis management in place for your brand.
Using real examples of why major brands got it wrong, this guide will explain just what you need to do to protect your brand's reputation on social media.
Download the full whitepaper at www.stickyeyes.com/intelligence
This paper investigate the relationship between word of mouth dimensions volume,
valance and source type with customer based brand equity dimensions brand awareness,
brand image, perceived quality and brand loyalty. Study is conducted in Islamabad
Pakistan on Five GSM companies working in Pakistan. Structural questioning model was
used in methodology. Our study revealed that volume and valance has significant impact
on CBBE while source type relation is not significant.
What the books about social media don't tell you Koen Delvaux
Social media campaigns are hot. Yet, it isn't about the campaign but about transforming your company into a cocreation environment where customers are part of your organization.
New Jersey Food Council Social Media PresentationHelen Levinson
Social media has experienced an explosion of growth over the last few years and has become much more than just a personal tool to have fun and stay connected; it is a vehicle that brands use to market their businesses, services and products online. But along with the benefits of using these tools lie potential pitfalls. Consider if information was leaked online and, even worse, you didn’t know it was out there. Are you prepared for serious damage control? Regularly monitoring your online reputation is crucial in protecting your brand. By following activity on social networks, blogs, message boards, and keeping an eye on YouTube videos, retailers can be aware of issues that arise, in turn respond quickly, minimizing the potential threat.
Participants will learn:
• 6 Social Media Best Practices
• Online Reputation Risk Management and Tracking
• Ways to Identify Online Threats
• YouTube Videos and Safety Control
• Compliance Issues Using Social Media
Krista Neher (www.KristaNeher.com), CEO of Boot Camp Digital (www.BootCampDigital.com) provides keynote presentations on Visual Social Media Marketing for organizations of all sizes.
This presentation covers the psychology of how our brands process visuals and images. Next, it dives into the importance of visuals in social media marketing. Having strong visuals on your website is required in the age of visual marketing. This means pinnable images on all of your web pages.
Finally the presentation includes Pinterest, Instagram and Infographics and shares actionable strategies and tips that you can implement to take your social media marketing to the next level.
This presentation is based on the bestselling book Visual Social Media Marketing (www.VisualSocialMediaMarketing) by Krista Neher.
How to convince clients, colleagues, even your boss that social media is important - by overcoming these 10 common objections you'll build a case no one can refuse!
How to Manage a Social Media Crisis explains how you can put a social media crisis management in place for your brand.
Using real examples of why major brands got it wrong, this guide will explain just what you need to do to protect your brand's reputation on social media.
Download the full whitepaper at www.stickyeyes.com/intelligence
This paper investigate the relationship between word of mouth dimensions volume,
valance and source type with customer based brand equity dimensions brand awareness,
brand image, perceived quality and brand loyalty. Study is conducted in Islamabad
Pakistan on Five GSM companies working in Pakistan. Structural questioning model was
used in methodology. Our study revealed that volume and valance has significant impact
on CBBE while source type relation is not significant.
Each year, the Word of Mouth Marketing Association celebrates the most effective campaigns in word of mouth with the WOMMY Awards. The winning campaigns aren’t just about creating word of mouth; they’re about learning how to make word of mouth work within a marketing objective.
Today, there are 162 channels, which companies can use to communicate, sell and service to their customers. Every organisation uses about 80 channels – often without being aware of all of them.
Customers adapt quickly and naturally use the diversity of channels. For an organisation, it is very difficult to integrate new channels that fast. Even worse, the overall customer experience suffers and customers start to look at different suppliers with experiences fitting their expectations. In general it is clear, that companies, which are not updating the multichannel experience will loose revenue.
Word of Mouth Marketing Seminar - The Word of Mouth Company PresentationLibmark
Word of Mouth Club – ‘We love to talk’ Jo Schultz and Vicki Foster established the Word of Mouth Club brand to ‘make women’s lives easier’. They are flying in from N.S.W. to share the success of their brand and its underlying premise that word-of-mouth marketing in all its incarnations and across diverse platforms (even libraries) is the most effective marketing.
Presented at LibMark's Word of Mouth Marketing Seminar in June 2014
... a SlideShare audio enhanced presentation from John Moore of Brand Autopsy ... first presented in May 2006
********************
Which came first ... Word-of-Mouth Marketing or Marketing worthy of Word-of-Mouth? It's similar to the age-old question of which came first--the Chicken or the Egg? This particular question has Creationists going up against Evolutionists in heated debates. Same goes for Word-of-Mouth Marketing where in one corner you have WOM Creationists and in the other corner you have WOM Evolutionists debating which method is best.
johnmoore, the marketing medic from the Brand Autopsy Marketing Practice, adds his unique perspective to this raging debate by dissecting the differences between Creationist WOM and Evolutionist WOM.
Social Media Best Practices For Luxury Brands.
This research and best practices explains how luxury brands can best accomplish these goals in social media and offers solutions for particular challenges. Additionally, this guide presents case studies of luxury brands to illustrate the industry best (and worst) practices.
Research / Case Studies:
BLACKSTONE Digital Agency
http://www.BlackstoneIndonesia.com
Site Florida - Social Media Strategy and Tactics Presentation: 140 CHARACTERS...Murray Izenwasser
140 CHARACTERS OR LESS: Is Social Media Driving Real Business or are we just Tweeting / Friending / Following / Linking / Digging between ourselves?
Can you truly use social media to drive business, and if so, how should your company be using social media to do so?
Presenstation made at the Bombay Management Association Seminar on How to use Social Media for Business. Grass root level understanding on using Social Media, Case Studies and suggestions on building Social Media Strategies
Social Media is not only helpful to businesses, it is an essential part of the marketing mix. Social Media should be like any other marketing program, set goals, monitor progress, measure results and adapt as needed. This was a presentation given to a National Printing Organization for Presidents and Business Owners.
Social Media and not only helpful to businesses, it is an essential part of the marketing mix. It is should be treated as such. Make sure your social media program is planned out well, monitored, and measured for results. This is a presentation given to a National Printing Association to Presidents, CEOs and Owners of Printing Companies about Social Media.
Are You Socially Acceptable is a Phoenix based group of really smart chicks who teach companies who to get the message across. We're not just public relations, marketing, event management, technology... we're what happens when you put it all together.
This presentation covers basic concepts, various social media platforms, the exponential growth of social media, case studies on how social media has benefited businesses and a detailed road map for building one's social media presence on the web.
Immunization Action Coalition 2010 Social Media Summit: From the Desk of the ...James Garrow
Presentation given at the Immunization Action Coalition's 2010 Social Media Summit, which was held in Philadelphia on June 15.
This presentation was geared towards government agencies considering using social media to conduct outreach and communication.
How to adapt to thrive in times of uncertainty
6th Annual Savant eCommerce Amsterdam Conference. 28th – 29th October 2021. Keynote 'There is no truth in the metaverse' by Jeroen Vinkesteijn.
Whats going on in retaling vinkesteijn mystery postingJeroen Vinkesteijn
Sessie op congres What's Going On In Retaling 07-10-20221 door Jeroen Vinkesteijn. Onderzoek in de vorm van mystery posting naar of bedrijven reageren op vragen-opmerkingen gepost op (social media) Facebook en Instagram en hoe. 75% van de respons van bedrijven blijkt niet in orde in dit uitgebreide longitudinale onderzoek. Bedrijven reageren vaak slecht of niet op vragen en opmerkingen op die social media. Slechts 25% reageert binnen 15 minuten met een passend, gepersonaliseerd en zinnig antwoord. Voor bedrijven betekent dit verlies van leads en sentiment, voor consumenten irritatie en onbegrip. Presentatie met groot aantal voorbeelden.
Presentatie tijdens de WebWinkelVakdagen 30-01-2020 over onderzoek met mystery posts met 150 cases op Facebook en Instagram. Response meting, snelheid, inhoud van antwoord, personalisatie etc.
Presentatie NRW meeting, editie NRW aan Zee 12-07-2018. 'Met volle tassen op de terrassen'. De samenhang tussen toerisme en retail namners CELTH en Breda University of applied sciences door Jeroen Vinkesteijn over Destination....shopping
Presentation on the truth: what IS the truth? Is there such a thing a the one-and-only truth? What is the influence of big data and predictive marketing in this? Keynote of 30-45 minutes.
Emerce e-Travel 21juni 2016 Travelnext Social Media dramatischJeroen Vinkesteijn
Onderzoek aan de NHTV Breda in opdracht van TravelNext naar social media inzet van top 100 bedrijven in toerisme, luchtvaart, hospitality en vrije-tijd in Nederland op Twitter en Instagram. Test tweets, foto's, reacties en vragen zijn uitgezet vanaf persoonlijke accounts en de (niet) reacties van de bedrijven gemonitord. De uitkomsten zijn dramatisch: engagement daadwerkelijk 'onderhouden' blijkt erg lastig.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
15. “ It is not the strongest of the species that survives, nor the most intelligent, but the one that is most responsive to change.” - Charles Darwin compagnies
69. 1. What are your goals 2. Why social media? 3. Listening is for free!
70.
71.
72.
73. 4. Does it match your total policy? 5. Can you handle it? 7. So metrics, ROI (or RevPAR) alternatives 6. Try, try and try again 8. Be flexible, brands will change! 9. Does it convert?
Tot zover deze inleidende presentatie. Er is nog heel veel waar ik geen aandacht aan heb kunnen besteden. Ik hoop dat het je wat meer inzicht heeft gegeven in het Weblog en Wiki Web. Kom eens langs bij de ICT en Onderwijs weblog en natuurlijk hoor ik graag wat je er van vond.