Internal presentation approved for public sharing.
This deck walks you through:
-What brands / organizations want to learn from social media data;
-How to choose a monitoring / analytics vendor;
-Examples of reporting capabilities
The original paper is written by Saima Aman and Stan Szpakowicz. I presented it to my batch. Sentiment Analysis has typically focused on recognizing positive and negative words.The authors goal was to investigate the expression of emotion in the language through a corpus annotation study.They achieve 73.89% accuracy according to the preliminary results of their emotion classification experiments.1
The original paper is written by Saima Aman and Stan Szpakowicz. I presented it to my batch. Sentiment Analysis has typically focused on recognizing positive and negative words.The authors goal was to investigate the expression of emotion in the language through a corpus annotation study.They achieve 73.89% accuracy according to the preliminary results of their emotion classification experiments.1
Social Media Brand Audit Report for Ralph Lauren by VOZIQVOZIQ
Brand Audit Report from VOZIQ with comprehensive assessment of overall brand, products and services to identify improvement opportunities. VOZIQ (http://voziq.com) provides social media analytics solutions & services to protect brands, improve marketing & PR effectiveness, generate sales leads & maximize your social media ROI.
In this webinar Julie Cleeland Nicholls, Adobe’s Director of Communications, Asia-Pacific, shares her recipe for success in managing and executing Adobe’s social media strategies.
This is a unique opportunity to uncover key tricks and tools from the corporate sector to help you improve your organisation’s not for profit social media presence.
To view the recording please visit: https://www.blackbaud.com.au/notforprofit-events/webinars/past
Here is a simple method instrument I have developed to help my clients to express the main targeted objectives they would like to reach through their Social Media efforts. For any question contact me at tcellerin@buzzfactory.ru
Social Media is a powerful way for organizations of every size and industry to interact with their customers, critics, fans, and partners. The introduction of Social Media has enabled users to post comments, thoughts and opinions about services and products. With the increased frequency of participation in these sites, users are quickly becoming co-contributors to your brand — making it difficult to control your own messaging. This complimentary webinar is great for marketers looking to quickly get up-to-speed on the elements of Social Media, and more importantly, how to leverage those elements to increase ROI and take control of brand positioning.
Presented at Measurement.ie 15th Feb 2012 by Gina Bowes (Glanbia Digital Communications Manager).
Contact: gina.bowes@gmail.com
Sources & images sourced where possible.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
More Related Content
Similar to SutherlandGold Social Media Monitoring & Analytics Vendor Selection Best Practices
Social Media Brand Audit Report for Ralph Lauren by VOZIQVOZIQ
Brand Audit Report from VOZIQ with comprehensive assessment of overall brand, products and services to identify improvement opportunities. VOZIQ (http://voziq.com) provides social media analytics solutions & services to protect brands, improve marketing & PR effectiveness, generate sales leads & maximize your social media ROI.
In this webinar Julie Cleeland Nicholls, Adobe’s Director of Communications, Asia-Pacific, shares her recipe for success in managing and executing Adobe’s social media strategies.
This is a unique opportunity to uncover key tricks and tools from the corporate sector to help you improve your organisation’s not for profit social media presence.
To view the recording please visit: https://www.blackbaud.com.au/notforprofit-events/webinars/past
Here is a simple method instrument I have developed to help my clients to express the main targeted objectives they would like to reach through their Social Media efforts. For any question contact me at tcellerin@buzzfactory.ru
Social Media is a powerful way for organizations of every size and industry to interact with their customers, critics, fans, and partners. The introduction of Social Media has enabled users to post comments, thoughts and opinions about services and products. With the increased frequency of participation in these sites, users are quickly becoming co-contributors to your brand — making it difficult to control your own messaging. This complimentary webinar is great for marketers looking to quickly get up-to-speed on the elements of Social Media, and more importantly, how to leverage those elements to increase ROI and take control of brand positioning.
Presented at Measurement.ie 15th Feb 2012 by Gina Bowes (Glanbia Digital Communications Manager).
Contact: gina.bowes@gmail.com
Sources & images sourced where possible.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
4. Generating Insights
BRANDS WANT TO KNOW
• Where is the information
• How much are people talking
• How many people do we care about
• How do our customers feel& will we know it
• How do people feel
• How often do they do what we wish
• Are we getting our money’s worth or delivering value
“…[companies] can quickly identify relevant verbatims, classify comments by positive or
negative sentiment, and engage in all manner of text mining to reveal unexpected patterns
and trends…” – Gleansight Social Intelligence Q32011 Report
5. Choosing a Vendor
Technology Evaluation Factors: Organization Evaluation Factors:
Content aggregation and normalization Technological interest / aptitude
Text mining, tagging and database management Current workflow processes
Trigger alerts / automated reporting Identification of pain points by level, function and goal
Display / querying dashboard
Product roadmap
Reporting from
Forrester, Gleanster,
Altimeter Group and
Gartner analysts
Vendor Evaluation Factors: Organization / Vendor Fit:
Responsiveness / customer support Vendor ability to meet current and future
Training / onboarding / account setup organizational requirements
Vendor strategy / organizational health
6. Forrester Analysts Say…
Current offering:
Background information
Data sources
Text analysis
Functionality
Consulting / analysis services
Strategy:
Strength of management team
Corporate strategy
Product strategy
Cost
Market Presence:
Customers
Financials
Employees
8. Share of Voice: Channel and Author
160
Segmenting mentions by social
140
120 media channels signal (a) which
100 ones already have those
80
60
mentioning the brand; (b)
40
Client Mentions
whether any message pull
Industry Mentions
20 through occurs in channels we’ve
0
targeted.
Digg
Plurk
Bing
YouTube
Indenti.ca
Picasa
Clipmarks
Boardreader
Delicious
Pixsy
Facebook
Twitter
Yahoo News
Friendfeed
Google_Voice
18
16
14
12
Segmenting mentions by authors 10
signal (a) which ones maybe 8
6
brand advocates or badvocates; 4
Client Mentions
Industry Mentions
(b) who may be appropriate for 2
0
either customer reference lists or
lead lists. We recommend further
study.
9. Share of Voice: Sentiment and Hashtag
700
Generally, Client tracks to the
600 industry in terms of sentiment.
500 To increase positive
400 sentiment, we should examine
300
Client Sentiment
each aspect of the Customer
Industry Sentiment
200
Experience and User Experience.
100
0 30
Positive Neutral Negative 25
20
Client is associated with
15
conversations around recent
10 Client Hashtags
messaging foci: Industry Hashtags
#secondscreenand iOS devices. 5
The addition of #bestappever 0
indicates that authors of those
posts are likely candidates for
brand advocacy.
10. Additional Conversational Analysis
14 Client 153 Movie Strength = 45 Positive 1 Negative Sentiment =
Mentions App Mentions 9.2% Mentions Mention 45: 1
Strength:measure oflikelihood that your brand is being Sentiment:ratio of positive to negative mentions
discussed in social media. Phrase mentions w/in the last
24 hours divided by the total # of possible mentions
47 Unique 93 Total 11 Authors
Reach = 51% 69 Total Passion =
Authors Mentions of Multiple
Authors 16%
Mentions
Reach:measure of range of influence. Unique authors Passion:measure of likelihood that individuals
referencing the brand divided by total brand mentions talking about your brand will continue to do so
repeatedly. A small group of advocates that
continually talk about your brand will result in a
higher passion score. Every mention by a
different author will result in a lower passion
score
11. Social Media at a Glance
This sample report
exemplifies the data
visualizations available via
Lithium Social Media
Monitoring. Insight is
available with access to the
raw data.
Not pictured: pull quotes
with examples of love /
hate / recommendations
from customers relevant to
Netflix or Blockbuster.
12. Digital Peoplescape: Twitter
Discover the relationships those you
tweet with have.
Surface the themes relevant to your
2d degree circle.
Drill in to discover affinity
relationships
Ex. Twitter and Townhall both
discuss #AskObama. Potential for
joint campaign around that theme.
13. Social Media Trends and Opportunities
The mid-October spike resulted from of a
feature release that encouraged social sharing
from within the app.
The late November dip was likely driven by
Thanksgiving holidays, as fewer people used
the app on Thanksgiving.
Client should consider integrating online and
event marketing efforts, with campaigns at
industry events in LA and mobile app events in
Seattle.
A foursquare scavenger hunt, booth demo
giveaways, or FanAdvocate events can generate
additional buzz. …and so on…
Editor's Notes
**Double check page #s
What are the typical questions brands and brand managers want to know?
Leverage reporting from analysts to narrow the pool;Take a structured approach to vendor selection and implementation;Organization and vendor fit matter!
Because we’re using analysts as a starting point, we should be mindful of how they evaluate vendors.