Social media (for beginners) class presented at the Story@Home / RootsTech conference March 2013. Part 1 covered the basics of Facebook (shown live), Instagram, Twitter and Google Plus. Part 2 went into detail on how to use these sites for genealogy and family history.
The document provides feedback from the author's peers on their presentation topics, with suggestions to improve explanations and ensure the topic is clearly focused. Key feedback included making spider diagrams more clear and learning more from explanations. The peers' feedback helped the author decide on their final topic.
1. Jay Ruane discusses the responsible and ethical use of social media in a law practice. He outlines best practices for using Facebook, Twitter, and implementing a social media policy.
2. Key recommendations include only sharing information publicly that clients have consented to, avoiding confidential details, and making clear that any views expressed are personal and not associated with the firm.
3. An effective social media policy reminds employees that online comments have permanence, respects others' privacy and copyright, and addresses issues like friending clients on social networks.
Engaging the Online Reader through Social MediaLogan Aimone
Learn how journalists are using social media to engage their audiences -- both to gather information and to promote content. Presented at AEJMC Gateway Teach-in for scholastic journalism educators, Aug. 9, 2011.
This document provides an overview of social media for beginners. It introduces common social media platforms like blogging, bookmarking, deals, location-based, music, photo sharing, and video sharing sites. It then describes the "Fab Four" major social networks in more detail: Google+ for personal profiles and brands, LinkedIn for professional networking, Twitter for real-time updates, and Facebook as the most popular network. The document concludes with final takeaways around only using sites you need, managing privacy settings, being mindful of what you post and who you connect with, and having fun with social media.
This document provides an introduction to the social networking site FriendFeed. It discusses:
1) What FriendFeed is - an aggregator that streams feeds from social networks, bookmarks, news, videos into one place and allows users to organize feeds into groups.
2) Why it's important for marketers - it allows marketers to follow conversations, spot opportunities from customer questions/complaints, and interact with their audience to build trust.
3) Steps to set up a FriendFeed account and add social media feeds and blogs to your FriendFeed profile.
The document provides instructions for using Pinterest to market a business. It explains that Pinterest and photos are favored by Facebook and Google algorithms, allowing content to spread widely and rank highly in search results. It outlines five steps: 1) Understanding Pinterest's power, 2) Setting up a profile, 3) Pinning content, 4) Making it easy for people to connect, and 5) What not to do, such as overt self-promotion. The goal is to subtly share visually appealing content related to one's niche or products to engage Pinterest's large audience.
Millennials are driving 10 trends in 2015 including the makers movement, content proliferation, net neutrality, conscious consumption, empowerment of women, and philanthropy. They seek authentic, locally-sourced goods and fight for internet freedom. Millennials also heavily consume online content and research products online. They are health-conscious and influenced by social media to curate idealized images of their lives. Millennials want brands that support good causes and empower women. They also participate in charitable challenges that benefit them socially.
The document provides feedback from the author's peers on their presentation topics, with suggestions to improve explanations and ensure the topic is clearly focused. Key feedback included making spider diagrams more clear and learning more from explanations. The peers' feedback helped the author decide on their final topic.
1. Jay Ruane discusses the responsible and ethical use of social media in a law practice. He outlines best practices for using Facebook, Twitter, and implementing a social media policy.
2. Key recommendations include only sharing information publicly that clients have consented to, avoiding confidential details, and making clear that any views expressed are personal and not associated with the firm.
3. An effective social media policy reminds employees that online comments have permanence, respects others' privacy and copyright, and addresses issues like friending clients on social networks.
Engaging the Online Reader through Social MediaLogan Aimone
Learn how journalists are using social media to engage their audiences -- both to gather information and to promote content. Presented at AEJMC Gateway Teach-in for scholastic journalism educators, Aug. 9, 2011.
This document provides an overview of social media for beginners. It introduces common social media platforms like blogging, bookmarking, deals, location-based, music, photo sharing, and video sharing sites. It then describes the "Fab Four" major social networks in more detail: Google+ for personal profiles and brands, LinkedIn for professional networking, Twitter for real-time updates, and Facebook as the most popular network. The document concludes with final takeaways around only using sites you need, managing privacy settings, being mindful of what you post and who you connect with, and having fun with social media.
This document provides an introduction to the social networking site FriendFeed. It discusses:
1) What FriendFeed is - an aggregator that streams feeds from social networks, bookmarks, news, videos into one place and allows users to organize feeds into groups.
2) Why it's important for marketers - it allows marketers to follow conversations, spot opportunities from customer questions/complaints, and interact with their audience to build trust.
3) Steps to set up a FriendFeed account and add social media feeds and blogs to your FriendFeed profile.
The document provides instructions for using Pinterest to market a business. It explains that Pinterest and photos are favored by Facebook and Google algorithms, allowing content to spread widely and rank highly in search results. It outlines five steps: 1) Understanding Pinterest's power, 2) Setting up a profile, 3) Pinning content, 4) Making it easy for people to connect, and 5) What not to do, such as overt self-promotion. The goal is to subtly share visually appealing content related to one's niche or products to engage Pinterest's large audience.
Millennials are driving 10 trends in 2015 including the makers movement, content proliferation, net neutrality, conscious consumption, empowerment of women, and philanthropy. They seek authentic, locally-sourced goods and fight for internet freedom. Millennials also heavily consume online content and research products online. They are health-conscious and influenced by social media to curate idealized images of their lives. Millennials want brands that support good causes and empower women. They also participate in charitable challenges that benefit them socially.
Net neutrality is the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites. This document discusses the history of net neutrality and the Internet, as well as arguments for and against net neutrality from various perspectives such as economics, politics, philosophy, culture, and law. It concludes by advocating for maintaining a neutral Internet to protect consumers and freedom of access.
Net neutrality is the principle that Internet providers should treat all data equally and not discriminate based on content or user. It ensures users have equal access to all content and services online without interference from the provider. The issue affects content providers and whether broadband companies can create fast lanes for some sites. Supporters like Tim Berners-Lee argue for net neutrality to keep the Internet open, while opponents like AT&T argue for less regulation to encourage investment. The FCC is currently proposing new net neutrality rules that would reclassify broadband providers as common carriers.
A presentation on the changing world of the internet.
For more information on this presentations visit The Internet Show ME 2011: http://www.terrapinn.com/exhibition/internet-show-middle-east/
This document discusses the debate around net neutrality and the potential implications of a two-tiered Internet. It outlines the different layers of the Internet and battles that have occurred at each layer. It also examines arguments from Internet service providers that they should be able to prioritize or charge more for certain data traffic. Concerns are raised about how this could impact innovation if new services have to pay extra fees and whether it could undermine the open nature of the Internet. Overall, the document analyzes the complex issues around net neutrality and regulating how data is transmitted online.
The document provides a detailed overview of the history and development of the Internet from its origins as ARPANET in the 1960s to its modern applications. It discusses how ARPANET was developed by the US military to create a decentralized, resilient network. It then explains how ARPANET evolved into the Internet through the adoption of TCP/IP in the 1970s and the rise of commercial internet services in the 1990s. The document also summarizes some of the most commonly used Internet applications and protocols like email, chat, games, and virtual reality.
This document discusses the information society and how information technology has transformed the social environment. It defines an information society as one where digital citizens use computers as tools and where information technologies are changing how people live. It notes that the information society is the building block for knowledge societies. It then discusses expectations and realities of information technology, including its applications in scientific, technical, business, and social fields. Finally, it addresses how the social environment has been transformed through globalization, the rise of virtual communities, and specific online community examples like social media platforms and virtual worlds.
Net neutrality refers to the principle that Internet service providers should treat all data on the Internet equally and not discriminate or charge differently based on user, content, website, platform, application, type of attached equipment, or method of communication. Without net neutrality, Internet service providers could prioritize some data over others or even block or slow down certain websites or apps, putting some companies and content at a disadvantage. Supporters argue this could hamper innovation on the Internet and favor large corporations that can pay for preferential treatment over startups and smaller companies. The document discusses the debate around net neutrality and efforts in India and the US to preserve an open Internet without discrimination by Internet service providers.
This document provides an overview of search engine optimization (SEO) and search engine marketing (SEM) strategies. It discusses fundamental steps like keyword research, content writing, and promotion. It also covers topics like self-promotion, social media, integrated campaigns, tracking results, and whether to use an in-house or agency approach. Case studies of companies that have used these strategies are also mentioned.
This document discusses network neutrality, which is the principle that internet service providers should not restrict users' access to content or applications. It outlines arguments for and against network neutrality, including concerns that without it, ISPs could exploit consumers by forcing them to use certain services, blocking technologies, and monitoring online activity. The document also mentions proposed legislation like SOPA and PIPA that aimed to curb piracy but were opposed by many large tech companies.
The document discusses various UK legislation related to information and communication technology (ICT), including the Data Protection Act, Freedom of Information Act, Computer Misuse Act, Copyright Designs and Patents Act, and Health and Safety at Work Act. It explains how these legislations impact ICT policies and security practices within organizations. Compliance is important to avoid legal consequences, and the duties of both employers and employees are outlined.
This ppt is to make those people aware who are unknown of the idea of net neutrality......
And please do hit the like icon if you liked the presentation and if not, do leave your compliments so that i can make it better....
The ICT policy outlines how the organization's ICT strategy will be implemented through covering areas like training, security, and procurement. It is important policies are regularly reviewed to ensure they still meet organizational objectives. The policy also discusses conducting training during employee inductions, when new hardware/software is introduced, or when new legislation is enacted. Monitoring of training would be done by the HR department.
The document discusses net neutrality and why it is important. It explains that some internet providers were giving preferential treatment and "fast lanes" to large companies that could pay, putting smaller sites at a disadvantage. The FCC enacted new rules on February 26, 2015 to prohibit broadband providers from blocking or slowing internet content, preserving an open internet. However, some internet providers argue this will reduce investments, but supporters believe competition and shareholders will continue to drive innovation regardless.
The document discusses e-commerce technologies, consumer behavior in e-commerce, factors that influence customer behavior, and web marketing strategies. It describes how businesses use technologies like the internet, dynamic content generation, and client-server architectures to enable e-commerce. It also examines how consumer values, web experiences, and segmentation can be used to target different customer groups in e-commerce.
The document discusses different types of e-commerce:
- B2B e-commerce accounts for about 80% of all e-commerce and is the fastest growing segment. It involves transactions between businesses.
- B2C e-commerce involves transactions between businesses and consumers through online retail stores. It was an early form of e-commerce.
- B2G e-commerce is commerce between businesses and the public sector, such as through government procurement websites. However, it is a small part of the overall e-commerce market.
- C2C e-commerce allows transactions between individuals, such as through online auctions, file sharing, and classified listings. It has potential to create new markets.
The document discusses how online social networks are changing how people work, play, buy, research, study, find information, meet people, date, share photos and videos, rate products and services, express opinions, travel, participate in activities, work out, sign up for services, check in to locations, and check out of locations. It provides statistics on social media usage in the United States and New Mexico. It also summarizes popular social media platforms like Facebook, YouTube, Twitter, and LinkedIn and how they are used.
The document discusses how online social networks are changing how people work, play, buy, research, study, find information, meet, date, and participate in various other activities. It notes that over 60% of Americans use social media, with those age 35 and under having near-universal adoption. Social media platforms like Facebook, YouTube, and Twitter are among the most visited websites, surpassing traditional media and search engines in some measures. The growth and impact of social media are changing how organizations communicate and interact with their audiences.
The document discusses the importance of social media and provides tips for improving social media skills. It highlights that social media allows access to global information, and can be used to deepen relationships, support customers, and influence others. Specific guidance is offered for optimizing profiles on Facebook, Twitter, and LinkedIn and engaging audiences through sharing content and asking questions. Dashboards are recommended for scheduling posts across multiple networks to efficiently consume, engage with, and track social media interactions.
The document discusses using social media tools to educate. It recommends establishing clear objectives for social media use, such as increasing program attendance or raising awareness of topics. The document also suggests starting by naming your program and key objectives. Additionally, it discusses building a social media team, setting rules for posts, and sharing content like events, photos and videos to engage audiences on platforms like Facebook, Twitter, blogs and Pinterest. The overall goal is to work smarter using social media to educate target audiences.
Social media provides new opportunities for businesses to connect with customers and promote their brand. It allows sharing of content like photos, videos and blogs. While social media involves a lot of noise, it can help businesses through customer service, marketing, sales and thought leadership if integrated with an existing online strategy. The document provides tips on setting up accounts on major social networks like Facebook and Twitter, listening to conversations, building an audience and engaging in discussions to build relationships.
Net neutrality is the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites. This document discusses the history of net neutrality and the Internet, as well as arguments for and against net neutrality from various perspectives such as economics, politics, philosophy, culture, and law. It concludes by advocating for maintaining a neutral Internet to protect consumers and freedom of access.
Net neutrality is the principle that Internet providers should treat all data equally and not discriminate based on content or user. It ensures users have equal access to all content and services online without interference from the provider. The issue affects content providers and whether broadband companies can create fast lanes for some sites. Supporters like Tim Berners-Lee argue for net neutrality to keep the Internet open, while opponents like AT&T argue for less regulation to encourage investment. The FCC is currently proposing new net neutrality rules that would reclassify broadband providers as common carriers.
A presentation on the changing world of the internet.
For more information on this presentations visit The Internet Show ME 2011: http://www.terrapinn.com/exhibition/internet-show-middle-east/
This document discusses the debate around net neutrality and the potential implications of a two-tiered Internet. It outlines the different layers of the Internet and battles that have occurred at each layer. It also examines arguments from Internet service providers that they should be able to prioritize or charge more for certain data traffic. Concerns are raised about how this could impact innovation if new services have to pay extra fees and whether it could undermine the open nature of the Internet. Overall, the document analyzes the complex issues around net neutrality and regulating how data is transmitted online.
The document provides a detailed overview of the history and development of the Internet from its origins as ARPANET in the 1960s to its modern applications. It discusses how ARPANET was developed by the US military to create a decentralized, resilient network. It then explains how ARPANET evolved into the Internet through the adoption of TCP/IP in the 1970s and the rise of commercial internet services in the 1990s. The document also summarizes some of the most commonly used Internet applications and protocols like email, chat, games, and virtual reality.
This document discusses the information society and how information technology has transformed the social environment. It defines an information society as one where digital citizens use computers as tools and where information technologies are changing how people live. It notes that the information society is the building block for knowledge societies. It then discusses expectations and realities of information technology, including its applications in scientific, technical, business, and social fields. Finally, it addresses how the social environment has been transformed through globalization, the rise of virtual communities, and specific online community examples like social media platforms and virtual worlds.
Net neutrality refers to the principle that Internet service providers should treat all data on the Internet equally and not discriminate or charge differently based on user, content, website, platform, application, type of attached equipment, or method of communication. Without net neutrality, Internet service providers could prioritize some data over others or even block or slow down certain websites or apps, putting some companies and content at a disadvantage. Supporters argue this could hamper innovation on the Internet and favor large corporations that can pay for preferential treatment over startups and smaller companies. The document discusses the debate around net neutrality and efforts in India and the US to preserve an open Internet without discrimination by Internet service providers.
This document provides an overview of search engine optimization (SEO) and search engine marketing (SEM) strategies. It discusses fundamental steps like keyword research, content writing, and promotion. It also covers topics like self-promotion, social media, integrated campaigns, tracking results, and whether to use an in-house or agency approach. Case studies of companies that have used these strategies are also mentioned.
This document discusses network neutrality, which is the principle that internet service providers should not restrict users' access to content or applications. It outlines arguments for and against network neutrality, including concerns that without it, ISPs could exploit consumers by forcing them to use certain services, blocking technologies, and monitoring online activity. The document also mentions proposed legislation like SOPA and PIPA that aimed to curb piracy but were opposed by many large tech companies.
The document discusses various UK legislation related to information and communication technology (ICT), including the Data Protection Act, Freedom of Information Act, Computer Misuse Act, Copyright Designs and Patents Act, and Health and Safety at Work Act. It explains how these legislations impact ICT policies and security practices within organizations. Compliance is important to avoid legal consequences, and the duties of both employers and employees are outlined.
This ppt is to make those people aware who are unknown of the idea of net neutrality......
And please do hit the like icon if you liked the presentation and if not, do leave your compliments so that i can make it better....
The ICT policy outlines how the organization's ICT strategy will be implemented through covering areas like training, security, and procurement. It is important policies are regularly reviewed to ensure they still meet organizational objectives. The policy also discusses conducting training during employee inductions, when new hardware/software is introduced, or when new legislation is enacted. Monitoring of training would be done by the HR department.
The document discusses net neutrality and why it is important. It explains that some internet providers were giving preferential treatment and "fast lanes" to large companies that could pay, putting smaller sites at a disadvantage. The FCC enacted new rules on February 26, 2015 to prohibit broadband providers from blocking or slowing internet content, preserving an open internet. However, some internet providers argue this will reduce investments, but supporters believe competition and shareholders will continue to drive innovation regardless.
The document discusses e-commerce technologies, consumer behavior in e-commerce, factors that influence customer behavior, and web marketing strategies. It describes how businesses use technologies like the internet, dynamic content generation, and client-server architectures to enable e-commerce. It also examines how consumer values, web experiences, and segmentation can be used to target different customer groups in e-commerce.
The document discusses different types of e-commerce:
- B2B e-commerce accounts for about 80% of all e-commerce and is the fastest growing segment. It involves transactions between businesses.
- B2C e-commerce involves transactions between businesses and consumers through online retail stores. It was an early form of e-commerce.
- B2G e-commerce is commerce between businesses and the public sector, such as through government procurement websites. However, it is a small part of the overall e-commerce market.
- C2C e-commerce allows transactions between individuals, such as through online auctions, file sharing, and classified listings. It has potential to create new markets.
The document discusses how online social networks are changing how people work, play, buy, research, study, find information, meet people, date, share photos and videos, rate products and services, express opinions, travel, participate in activities, work out, sign up for services, check in to locations, and check out of locations. It provides statistics on social media usage in the United States and New Mexico. It also summarizes popular social media platforms like Facebook, YouTube, Twitter, and LinkedIn and how they are used.
The document discusses how online social networks are changing how people work, play, buy, research, study, find information, meet, date, and participate in various other activities. It notes that over 60% of Americans use social media, with those age 35 and under having near-universal adoption. Social media platforms like Facebook, YouTube, and Twitter are among the most visited websites, surpassing traditional media and search engines in some measures. The growth and impact of social media are changing how organizations communicate and interact with their audiences.
The document discusses the importance of social media and provides tips for improving social media skills. It highlights that social media allows access to global information, and can be used to deepen relationships, support customers, and influence others. Specific guidance is offered for optimizing profiles on Facebook, Twitter, and LinkedIn and engaging audiences through sharing content and asking questions. Dashboards are recommended for scheduling posts across multiple networks to efficiently consume, engage with, and track social media interactions.
The document discusses using social media tools to educate. It recommends establishing clear objectives for social media use, such as increasing program attendance or raising awareness of topics. The document also suggests starting by naming your program and key objectives. Additionally, it discusses building a social media team, setting rules for posts, and sharing content like events, photos and videos to engage audiences on platforms like Facebook, Twitter, blogs and Pinterest. The overall goal is to work smarter using social media to educate target audiences.
Social media provides new opportunities for businesses to connect with customers and promote their brand. It allows sharing of content like photos, videos and blogs. While social media involves a lot of noise, it can help businesses through customer service, marketing, sales and thought leadership if integrated with an existing online strategy. The document provides tips on setting up accounts on major social networks like Facebook and Twitter, listening to conversations, building an audience and engaging in discussions to build relationships.
This document discusses social media monitoring and engagement tools. It provides statistics about Twitter usage including that it has 500 million users who send 170 billion tweets per month. It discusses principles of social media like being transparent, authentic, and persistent. The document outlines an engagement pyramid model from watching to commenting to producing content. It also lists several social media monitoring and management tools like Hootsuite, Sprout Social, and Salesforce Marketing Cloud.
Social Media: What Is It? Why You Need Strategy & How To Get It.Ben Finch
Social Media: What Is It?, Why You Need Strategy & How To Get It. Many businesses now realize the need to be involved in Social Media yet lack the knowledge and know-how of implementing a clear strategy backed by sound tactics. Learn what fuels the Social Media industry and how to get your foot in the door on an arena your business can’t afford to ignore. Join Ben as he shares personal insights & inspiring stories from others who have literally re- written the rules of business by harnessing the power of social media.
Social Media: What Is It? Why You Need Strategy & How To Get It.Ben Finch
Social Media: What Is It?, Why You Need Strategy & How To Get It. Many businesses now realize the need to be involved in Social Media yet lack the knowledge and know-how of implementing a clear strategy backed by sound tactics. Learn what fuels the Social Media industry and how to get your foot in the door on an arena your business can’t afford to ignore. Join Ben as he shares personal insights & inspiring stories from others who have literally re- written the rules of business by harnessing the power of social media.
The document discusses social media and provides an overview of popular platforms like Facebook and Twitter. It explains that social media allows for the creation and sharing of content. Facebook allows users to create profiles, share photos and updates, and connect with others in their network. Twitter enables users to share information in real-time and follow topics through hashtags and trends. The document notes that two-thirds of internet users visit social networks and 22% of online time is spent on social media platforms.
The document discusses engaging youth via social media. It provides credentials for the author and an overview of the growth of social media. It emphasizes that social media is now where most internet users engage and is an important way to understand markets. It then discusses developing a social media strategy including objectives, tactics, and measurement. Key aspects of a strategy include developing valuable content, engagement methods like blogs and contests, community management, and analytics. Specific tips provided include starting to listen, creating a blog, using Twitter and LinkedIn, notifying customers, and using management tools like Hootsuite.
The 21st century knowledge and information professionalCollabor8now Ltd
The volume of information continues to grow at an exponential rate; new tools, products and web services appear almost daily. Despite the recession, nothing seems to stem the tide of innovation. If anything, the economic climate has enabled companies to be even more radical in the way they create and use information. These are challenging times for the knowledge and information professional. We all need to be able to work smarter, acquiring and developing the skills to become more effective knowledge and information workers.
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"Bright One
Charities have grasped the opportunities that social media gives to communicate with their supporters, often being nimbler and more innovative than their private sector counterparts. Facebook and Twitter have become the dominant platforms, allowing charities to communicate directly with their supporters using rich and engaging content. But with new platforms on the rise - including social networks like Google+, mobile apps like Instagram, and devices liked the iPad - new and ever more divergent opportunities for stakeholder engagement are becoming apparent.
Whether communicating with donors, funders, government, internally or with 'free agents', charities face bigger challenges - and threats - more than ever. How can charities keep up with new technologies and platforms? What should their strategic approach be to ensure they are making the most of these opportunities? What are the risks and how can these be overcome?
LiveWire2011: social media for local governmentalan jones
A 45min presentation on why social media may be the best medium for local government organisations seeking to communicate with their community.
Presented at LiveWire2011 Wollongong (see http://livewirenetwork.com.au/)
Social Media and Agriculture: From Experimentation to Real ROILeslie Bradshaw
This is a presentation that I adapted from my Trends in Agriculture presentation from November 2009. The audience was comprised of state-level representatives to the U.S. Wheat Associates Communications Working Group and was delivered on Saturday, January 24, 2010.
Many thanks to Steve Mercer (Director of Communications for the national U.S. Wheat Associates), with whom I have now worked on a number of ag / social media communications presentations since first being acquainted in 2009.
08917 netconnect presentation_15_junev2Lisa Harrison
Lisa Harrison is a social media expert who is passionate about online communities. She gives a presentation about the power of social media and how to effectively use platforms like Facebook and Twitter to engage audiences. Some of her tips include listening to your followers, acting like a person not just a logo, and fostering a sense of community on your pages. She emphasizes that social media is about interacting with people and building relationships rather than just broadcasting messages.
This document provides an overview of Session III of a course on beginning social media. [1] It reviews key points from previous sessions on developing a social media strategy and profile design. [2] The bulk of the document covers social media platforms Twitter and LinkedIn, defining their purposes and features, and offering tips on setting up an effective profile and engaging an audience for each. [3] It concludes by discussing tools for managing multiple social media accounts and assigning a final project to develop a social media strategy or analyze an organization's existing efforts.
Wendy Maynard, marketing maven and principal of Kinesis, Inc. presents Social Media Bootcamp, a how-to guide for business professionals. This slide presentation has a special emphasis on Twitter and Facebook.
The document discusses leveraging social media for virtual connections. It defines social media and provides examples of social media platforms. It discusses how social media allows ongoing communication and connection through exchanging ideas, keeping in touch, and maintaining relationships. The document then provides case studies of how different organizations have used social media successfully to connect with others virtually, including to explore careers, help people find jobs, understand patient experiences, and promote artists' work.
The document discusses the rise of social media and its importance for businesses. It notes that 2/3 of internet users visit social networks and that visiting social sites is now the 4th most popular online activity. It provides tips for businesses on how to successfully utilize social media, including having a strategy, listening to customers, giving generously, and measuring results. The document emphasizes that social media can help improve customer service and word of mouth if the company's product or service is good, but social media alone cannot fix a poor product.
Similar to Story@Home: Social Media, Part 1 & Part 2 (20)
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Story@Home: Social Media, Part 1 & Part 2
1. Story@Home: Social Media
Part 1 & Part 2
Presented by Tauni Everett, Emily Hill & Stephanie Hansen
2. Tauni Everett
PR Professional & Conference Organizer
Website: www.snapcreativity.com &
www.snapconference.com
Twitter: @taunitweets @snapconf
Facebook: www.facebook.com/snaptheconference
Pinterest: www.pinterest.com/snapconf
Instagram: www.instagram.com/tauni
LinkedIn: http://www.linkedin.com/profile/view?id=3881604
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
3. • Launched in February 2004.
• Started as a networking site for college students before
opening to everyone over the age of 13 with an email
address in 2006.
• Boasts over 1 billion registered users as of September
2012.
• Reports more than a trillion page views a month; about 50
percent are made on a mobile device.
• Removes approximately 20,000 profiles a day for various
infractions.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
4. Stephanie Hansen
Community Manager, Social Media Specialist,
& Chief Unicorn Wrangler
Website: www.thedailyblarg.com
Twitter: @sahans
Facebook: www.facebook.com/thedailyblarg
Instagram: www.instagram.com/sahans
Pinterest: www.pinterest.com/sahans
LinkedIn: www.linkedin.com/in/hansenstephanie
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
5. What is Twitter?
Launched March 21st, 2006…its 7th birthday was yesterday.
Started by asking users to share “What are you doing right now?” in
140 characters or less.
Reports over 200 million active users sending 400 million tweets each
day.
Known as a place to share news, debate politics, exchange ideas, tell
jokes, share stories, or talk about what you made for dinner…all in
real time.
Considered micro-blogging--sharing small bits and pieces of life in a
few words.
Accessed via web browser, online/desktop applications, and mobile
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
devices.
Hansen
6. What Does It Look Like?
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
7. What Does It All Mean?
1. Navigation Bar
Click on an icon to take
you to your home
screen, mentions, or
search.
2. Profile
View your recent
tweets, profile,
followers, and who you
are following
3. Compose Tweet
Share your 140
characters of wisdom
here.
4. News Feed
Read what those you
follow are saying.
5. Settings
Change your profile
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
image, about info,
Hansen
8. What is Instagram?
Instagram Launched October 2010.
The program allows you to take photos, edit, apply filters, and share
photos using your mobile device.
Instagram is an iOS- (iPhone, iPod Touch) and Android-based photo
editing and sharing application.
As of January 2013 Instagram had over 90 million active users.
Instagram allows you to share photos with other social networks
such as Facebook and Twitter.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
9. What Does It Look Like?
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
10. Home
Screen SearchTake
Photo News
Feed Profile
Focus and Snap What Does It All Mean?
Filters
Like
Photo
Leave
Commen
t
Online Profile
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
11. Why use Twitter?
Quick and easy way to share and get information.
It’s fun to be creative in 140 characters or less.
Keep track of kids’ online profiles.
Communicate easily with like-minded groups participating in moderated
chats.
Why use Instagram?
Instantly take, edit, and share photographs.
Easy “mobile scrapbook” on the go.
View and enjoy photos from family and friends.
Find people with similar interests such as dogs or food or unicorns.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
12. Emily Hill
Writer, Editor, Social Media Junkie Specialist
Website: www.isthisREALLYmylife.com
Twitter: @emihill
Facebook: www.facebook.com/isthisREALLYmylife
Pinterest: www.pinterest.com/emihill
Instagram: www.instagram.com/emihill
Google+:
plus.google.com/u/0/117193490485837330328
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
/
Hansen
13. What is Google Plus?
• Launched in June, 2011.
• Started as Google Circles with an emphasis on organizing people
in your network—friends, family, business associates, Twitter
peeps.
• Considered Google’s attempt to compete with Facebook . . . but
Google Plus isn’t trying to be Facebook.
• Boasted 500 million registered users as of December 2012 but
less than half are active on a monthly basis.
• Known for Google Hangouts and Communities (covered in Social
Media Part 2).
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
14. What does it look like?
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
15. What does it all mean?
4
1 2
3
1. Navigation bar
Click on an icon to view your
profile, explore popular posts,
browse communities, etc.
2. News feed
Select a tab to view posts from
your various “circles.”
3. Suggestions & notifications
See upcoming events,
trending topics, users to follow,
etc.
4. Profile & settings
Decide who sees what and
when and how you want
notifications.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
16. What about Google Plus Circles?
1. Organize people into groups (or “circles”); add people to multiple circles.
2. Click on “Find people” to see other Google Plus members you might know.
3. Select “Added you” to see who has added you to their circles.
2
3
1
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
17. (Google Plus Circles continued)
Choose which blog posts to share with which circles.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
18. Why use Google Plus?
• Google Circles are an easy and intuitive way to manage
relationships.
• Profile setup and privacy settings are a breeze.
• Google+ Hangouts are “chatrooms on steroids” and a great way to
interact with like-minded groups.
• Google Communities enable you to interact with those who share
similar interests. Post photos, videos, events or host discussions in
Hangouts.
• Sharing content is safe; Google+ lets you instantly assign a privacy
level to content as you share it.
• Google Photo Galleries allow instant mobile uploading, powerful
editing tools and easier photo viewing.
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
19. Tauni Everett
PR Professional & Conference Organizer
Website: www.snapcreativity.com &
www.snapconference.com
Twitter: @taunitweets @snapconf
Facebook: www.facebook.com/snaptheconference
Pinterest: www.pinterest.com/snapconf
Instagram: www.instagram.com/tauni
LinkedIn: http://www.linkedin.com/profile/view?id=3881604
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
20. Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
21. Stephanie Hansen
Community Manager, Social Media Specialist,
& Chief Unicorn Wrangler
Website: www.thedailyblarg.com
Twitter: @sahans
Facebook: www.facebook.com/thedailyblarg
Instagram: www.instagram.com/sahans
Pinterest: www.pinterest.com/sahans
LinkedIn: www.linkedin.com/in/hansenstephanie
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
22. The Power of Twitter for Your Family
With Twitter you can:
• Preserve your online presence.
• Micro-blog quick memories on the go.
• Create family tracking with # (hashtags) such as
#HansenFamilyReunion to keep up to date on family happenings.
• Make lists to organize family members, friends, and others.
• Provide an example of proper online etiquette for future family
members.
• Stay up to date on technology younger family members use.
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
23. Twitter Lists and # Hashtags
Lists: # Hashtags:
• Organize people into lists • Easily track and watch
such as family, friends, events with # hashtags
and companies. (#grammys or
• Easily sort and read #unicorns).
tweets from each list. • Create your own
• Control privacy easily. hashtags for an online
chat with family
(#FamilyChat).
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
24. Online and On the Go Applications
Tweetdeck Hootsuite Twitter Tweetcaste
r
Online and Mobile App Online and Mobile App Online and Mobile App Mobile App
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
25. Preserving Memories for the Future
Genealogy isn’t all about looking into the past. It’s also about saving
information for the future.
• Your camera isn’t always in your pocket but your phone usually is.
Capture those funny, cute, and amazing moments on Instagram.
• Services from sites such as Blurb.com and Keepsy.com allow you
to turn your Instagram photos into tangible photo and memory
books.
• Instagram offers an online feed of your photographs you can send
to family members and friends.
• Instagram will store your photos for free…but we all know the
memories from those photos are priceless.
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
26. Emily Hill
Writer, Editor, Social Media Junkie Specialist
Website: www.isthisREALLYmylife.com
Twitter: @emihill
Facebook: www.facebook.com/isthisREALLYmylife
Pinterest: www.pinterest.com/emihill
Instagram: www.instagram.com/emihill
Google+:
plus.google.com/u/0/117193490485837330328
Social Media Part 1 Presented by Tauni Everett, Emily Hill, and Stephanie
/
Hansen
27. The Power of Google Plus for Family History
Do you really need one more social media platform?
Circles + Hangouts + Communities + Explore = YES!
With Google Plus you can:
• Connect with genealogists and family history writers (CIRCLES).
• Have real-time conversations with up to 10 people (HANGOUTS).
• Join groups built around your areas of interest (COMMUNITIES).
• Keep up-to-date with the latest genealogy-related news
(EXPLORE).
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
28. Google Plus Circles
• Organize people into groups (similar to setting up lists in Facebook).
• View updates for a specific circle by clicking on that tab on your homepage.
• Create a genealogy circle and view updates from those contacts.
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
29. Google Plus Hangouts
• Chat face to face with up to 10 people.
• Connect using your computer, laptop, smartphone or tablet.
• Broadcast live video conversations to the public using “Hangouts on Air.”
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
30. Google Plus Communities
• Give different groups/interests a home base (book club, family,
photography, cats,).
• Post videos and photos, plan events, exchange ideas and schedule
Hangouts.
• Create and/or join a community, and then stay up to date with your mobile
device.
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
31. Genealogy & Family History Communities on G+
Tech for Genealogy & Family History Researchers
https://plus.google.com/communities/117080274196807817033
Genealogy
https://plus.google.com/u/0/communities/111735994125443153155
Genealogy Tech
https://plus.google.com/communities/116370793440106034324
Family History Writers
https://plus.google.com/communities/114977011024441632198
Genealogy & Family History for Non-professionals (private)
https://plus.google.com/communities/107974370602325784050
DearMYRTLE’s Genealogy Community
https://plus.google.com/communities/104382659430904043232
Can’t find a community that fits your needs? Create one!
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen
32. Google Plus Explore (and Search)
1. Find out what is “trending” (popular) on Google Plus.
2. Decide how many posts should appear in your Home stream.
3. Search for a topic to find new content; save searches for easy future
browsing.
Note: Fine-tune your Explore page by following different Google Plus pages.
2
3
1
Social Media Part 2 Presented by Tauni Everett, Emily Hill, and Stephanie
Hansen