Slides from a presentation I delivered at the Potomac Forum's "Best Practices Symposium." You can find the associated video and blog post at http://www.genshift.com
The document provides 10 tips for finding employment. It recommends moving quickly on job applications, taking courses to improve skills, attending trade shows to meet people in person, using social media strategically, personalizing cover letters, staying organized, thinking about how to stand out from other candidates, recognizing you never know who you may meet, and knowing what you want for easier job searching. It concludes by wishing luck with the job hunt.
This document repeatedly lists the names Brett Sutch and Jack Sutch along with their affiliation to iDevise Marketing & Media. It appears to be a roster or contact list that includes these two individuals a total of ten times each, alternating their names, with both being associated with iDevise Marketing & Media.
This document discusses different approaches to leading through people or the "human asset approach". It provides examples of CEOs who prioritize developing and retaining talent.
Nestle's CEO believes in bringing managers together to discuss values and culture while respecting local expertise. United Biscuits' CEO focuses on detailed performance reviews and career planning to retain top talent. The CEO of SHV Holdings empowers managers by giving them 90% responsibility and a free working environment focused on innovation. Commonalities include spending significant time on talent development, understanding individuals, and creating an environment where people can succeed.
Data driven storytelling tips from an iron viz champion ryan sleeperRyan Sleeper
"Data-Driven Storytelling: Tip from an Iron Viz Champion" is a presentation by Ryan Sleeper, Manager of Data Visualization & Analysis at Evolytics. Ryan Sleeper is the 2013 Tableau Iron Viz Champion. This presentation was presented at the 2014 Tableau Conference in Seattle, Washington on 9/9/2014. The presentation offers fifteen actionable tips for improving your data visualization. For more information, visit Evolytics.com/15tips
The document discusses how the concept of DevOps has evolved and what may come next. It argues that the game has changed in that organizations need to focus more on cultivating a culture of continuous learning and breaking down silos. To thrive in the future, organizations will need to become "learning organizations" by assessing their performance on dimensions like team learning, empowerment, and strategic leadership. They will also need to move beyond labels like "DevOps" and focus on cultivating sharing and growth in individuals. The key is becoming a learning organization that helps others learn as well.
What the Internet of Things Really Means - For Marketers and Digital AgenciesZach Pousman
Last week at DIG South 2014 (Charleston, SC), I gave a talk titled “What the Internet of Things Really Means.” One of the next big drivers of transformation for consumers and businesses — and one of the biggest buzzwords — is the Internet of Things. IoT is defined by ubiquity: Technology and computation will become ubiquitous, truly integrated into our lives. Digital technologies will move into the “stuff” we have, the spaces we live and work in, and the stores at which we shop. The trend is still moving up the hype cycle, so the drumbeat of how exciting and revolutionary will continue to grow (before the inevitable realization that IoT isn’t a silver bullet and the warts and challenges of the systems become apparent).
The talk is organized into three sections: Why is the IoT is a big deal? What are the implications for designers, marketers, agencies and startups? And finally how we’re designing digital ecosystems to be ready for IoT?
The document discusses the implications of the Internet of Things (IoT). It notes that by 2020, 40 billion devices will be connected to the internet. This represents a shift from people primarily interacting with the internet through rectangular screens to an environment where everyday objects have sensors and are connected. This will require applying design skills in new contexts and considering how products behave and are experienced in different environments.
The document provides 10 tips for finding employment. It recommends moving quickly on job applications, taking courses to improve skills, attending trade shows to meet people in person, using social media strategically, personalizing cover letters, staying organized, thinking about how to stand out from other candidates, recognizing you never know who you may meet, and knowing what you want for easier job searching. It concludes by wishing luck with the job hunt.
This document repeatedly lists the names Brett Sutch and Jack Sutch along with their affiliation to iDevise Marketing & Media. It appears to be a roster or contact list that includes these two individuals a total of ten times each, alternating their names, with both being associated with iDevise Marketing & Media.
This document discusses different approaches to leading through people or the "human asset approach". It provides examples of CEOs who prioritize developing and retaining talent.
Nestle's CEO believes in bringing managers together to discuss values and culture while respecting local expertise. United Biscuits' CEO focuses on detailed performance reviews and career planning to retain top talent. The CEO of SHV Holdings empowers managers by giving them 90% responsibility and a free working environment focused on innovation. Commonalities include spending significant time on talent development, understanding individuals, and creating an environment where people can succeed.
Data driven storytelling tips from an iron viz champion ryan sleeperRyan Sleeper
"Data-Driven Storytelling: Tip from an Iron Viz Champion" is a presentation by Ryan Sleeper, Manager of Data Visualization & Analysis at Evolytics. Ryan Sleeper is the 2013 Tableau Iron Viz Champion. This presentation was presented at the 2014 Tableau Conference in Seattle, Washington on 9/9/2014. The presentation offers fifteen actionable tips for improving your data visualization. For more information, visit Evolytics.com/15tips
The document discusses how the concept of DevOps has evolved and what may come next. It argues that the game has changed in that organizations need to focus more on cultivating a culture of continuous learning and breaking down silos. To thrive in the future, organizations will need to become "learning organizations" by assessing their performance on dimensions like team learning, empowerment, and strategic leadership. They will also need to move beyond labels like "DevOps" and focus on cultivating sharing and growth in individuals. The key is becoming a learning organization that helps others learn as well.
What the Internet of Things Really Means - For Marketers and Digital AgenciesZach Pousman
Last week at DIG South 2014 (Charleston, SC), I gave a talk titled “What the Internet of Things Really Means.” One of the next big drivers of transformation for consumers and businesses — and one of the biggest buzzwords — is the Internet of Things. IoT is defined by ubiquity: Technology and computation will become ubiquitous, truly integrated into our lives. Digital technologies will move into the “stuff” we have, the spaces we live and work in, and the stores at which we shop. The trend is still moving up the hype cycle, so the drumbeat of how exciting and revolutionary will continue to grow (before the inevitable realization that IoT isn’t a silver bullet and the warts and challenges of the systems become apparent).
The talk is organized into three sections: Why is the IoT is a big deal? What are the implications for designers, marketers, agencies and startups? And finally how we’re designing digital ecosystems to be ready for IoT?
The document discusses the implications of the Internet of Things (IoT). It notes that by 2020, 40 billion devices will be connected to the internet. This represents a shift from people primarily interacting with the internet through rectangular screens to an environment where everyday objects have sensors and are connected. This will require applying design skills in new contexts and considering how products behave and are experienced in different environments.
You Can’t Buy Security
Building an Open Source Information Security Program
The document provides guidance on building an open source information security program through focusing on people, process, and technology. It emphasizes understanding the business first before implementing any security controls. The key steps outlined are:
1) Perform an information classification to understand what needs to be protected without using arbitrary values.
2) Draft security policies and procedures that are short, concise and relevant to the business.
3) Implement basic security controls like access controls, application security, network security, and operational controls using open source tools rather than purchasing products.
The presentation provides practical advice on building a security program from the ground up with an emphasis
Digital identity refers to the persona one develops through online activities and digital engagement. It can be easily influenced by social media posts, likes, and interactions, which shape others' perceptions. While a digital identity brings pressure to curate a positive online image, it can also be managed by being selective about what is shared, where it is shared, and with whom one connects online. With care, our digital identities can support rather than hinder our real identities.
The document discusses visualization and providing the big picture. It introduces The Big Picture company which helps visualize information through various methods like infographics, data visualization, and sketchnoting. Visualization is important because it helps people understand complex topics, focus on key details, share information more easily, and process visuals faster than text. The company's process involves reading the information, validating key details, and designing visualizations to help represent the most important aspects of the topic.
The document discusses strategies for building revenue generating websites, including teaching others how to do so. It promotes a program that guarantees 15-22% returns and shares revenue from websites that have received over 160 million views. The document then outlines four strategies for increasing online credibility and revenue: 1) adding social proof like testimonials and media coverage, 2) establishing an online "suit" or professional presence through platforms like Google+, LinkedIn, Facebook, and Twitter, 3) using Google AdWords to find profitable topics to write about, and 4) focusing websites on clearly meeting consumer needs and search demands.
Where Is Your #DigitalGenius Hiding? Digital strategy in the age of digital m...Doyle Buehler
Where Is Your #DigitalGenius Hiding? Digital strategy in the age of digital marketing by Doyle Buehler
Doyle is a world authority on digital transformation, a best selling author, podcaster, teacher and entrepreneur. He has consulted, coached, taught and inspired many in the areas of digital leadership, online marketing, social selling, social media marketing & digital strategy.
Doyle plays at the intersections of entrepreneurship and digital innovation, and has spent the past 16 years in the business world with multiple businesses and startups from around the world. He positions these digital leaders to think in a clearer, logical, more strategic manner for evolving their business.
Doyle host’s an iTunes podcast, Breaking.Digital, where he interviews digital marketing influences from around the world, discussing digital strategy and branding for B2B & B2C, and is a judge on the 2019 “Canadian Marketing Association Awards” and the “Australian Web Industry Association Awards
This document provides an overview of strategies for building revenue generating websites, including teaching others how to build or buy such sites. It discusses generating millions in annual revenue from over 600 websites with 160 million annual views. Key strategies highlighted include allowing others to participate for a percentage of revenue in perpetuity, and contractually guaranteeing high revenue percentages. The document emphasizes focusing on what today's information needs are rather than theories, and credibility, popularity and authority online often determining overall income levels.
Mosaic Theory of Information Security: For Technical WritersMargaret Fero
In finance, a concept called mosaic theory says that non-material information in sufficient quantities can be combined to constitute useful information. Investment analysts using this principle combine non-material information to develop significant insights into companies’ upcoming results without verging into insider trading.
In other words, a lot of insignificant details, like you might include in your documentation or share to social media, can be combined to deduce significant aspects of your or your organization’s private data. In non-financial information security, a similar principle applies. Small divergences from usual patterns can, when combined together, give a competitor or potential attacker hints about your organization’s strategy, upcoming product launches, or your private personal information.
In this talk, we discuss types of information you want to avoid posting about yourself or your organization to avoid unintentional disclosures.
Red vs. Blue Why we’ve been getting it wrong for 25 yearsEC-Council
Regarded as one of the world’s foremost experts on counter threat intelligence within the Information security industry, Chris Roberts constructs and directs a portfolio of defense services designed to improve the physical and digital security posture of both enterprise and government clients. With increasingly sophisticated attacks on targets of opportunity, Roberts’ unique methods of addressing the evolving threat matrix and experience with all information systems make him an indispensable partner to clients and industries that demand protection of financials, intellectual property, customer data and other protected information from attack.
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...Santhosh Tuppad
As technology evolved, software security faced huge challenges and as the years passed, the world has seen drastic changes far too quickly. And along with these advancements, even black-hat hackers or malicious hackers have evolved also very well. Today, the internet is the place for everyone where hackers dwell almost all the time. Every day new applications are released to the web and users start using them and even get addicted to them due to outstanding UX. But, wait! Did someone think about the "security" layer of these applications? Well, we often don’t and most of the applications today suffer from "beggarly / bad security".
In this talk, Santhosh Tuppad will focus on the pitfalls of bad security and why software security has failed in a pretty way. He will also shed light on how your users may be facing bigger problems than you can imagine due to bad software that lacks security testing. He will also demonstrate some of the lethal problems that exist in the industry and will talk about technical impact, business impacts like reputation damage, revenue loss and a lot more.
Not only that, Santhosh won’t end his talk without some hacking demonstrations that will for sure wow you. Finally, he will tell you how you can start security testing from day 1 and start contributing in terms of building secure software.
From this talk, you will gain an understanding about the problems that a lack of security testing presents and you find out about tool-assisted security testing; performing security tests through questioning. After the talk, you will be able to start identifying risks and report comm.on vulnerabilities giving you a feeling of “I can do this”
The document discusses how businesses can promote creativity within their organizations. It argues that traditional business structures often stifle creativity, but creativity is important for competitive advantage. It suggests that businesses focus on their people by encouraging open communication, sharing of ideas, and social interactions. This allows for "knowledge accidents" where people connect and new ideas emerge. The document provides specific recommendations for using tools like discussion forums, blogs, and social media to open conversations and sharing within an organization in order to promote innovation.
Digital Transformation Trends 2020 - What's Your Digital Strategy With Doyle ...Doyle Buehler
Digital Transformation Trends 2020 - What's Your Digital Strategy With Doyle Buehler
Get your PDF outlining the five core trends that will affect your business in 2020.
You may be surprised at what is coming, but also what is already here and what you have to deal with.
Trends are like glaciers - they don't really care who you are or what you do, or even if you try to move them out of the way - the bottom line is you can't move them, yet they can affect you greatly if you're not tuned into them properly, and understand why they are important.
Stop tinkering with your marketing in 2020. Make a positive change forward and find out what you need to know to make everything "click" online.
Put your best business forward find out what is most important to tune in to in the coming months, years and new decade.
Give yourself the help that you deserve with a complete and comprehensive roadmap for the future of your business.
Download now http://digitalmarketingtrends2020.respond.ontraport.net/
Put your best business forward and start planning your digital strategy.
Get started with defining your baseline and developing your digital genius and get a free copy of #Breakthrough: Unleash Your Remarkable Brand Value, Influence & Authority.
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...Dana Gardner
Transcript of a discussion on how the rapid shift to remote work accelerated the digital transformation of a New York-based publishing organization to reduce risk while preserving a highly creative and distributed culture.
Be a Modern Recruiter: Automate Your Pipeline with Your Brand | Talent Connec...LinkedIn Talent Solutions
This document discusses how to build and leverage an employer brand through social media and talent branding. It recommends automating the talent pipeline by defining the employee value proposition, developing engaging content for careers sites and social media, and showcasing employee stories. Metrics on job applications and hires through different platforms like LinkedIn, Facebook and YouTube are provided as examples of how to measure the impact of talent branding efforts.
This document discusses using social media effectively in the workplace. It notes that using social media internally requires understanding how it is used externally. It addresses common concerns about social media like wasted time but argues that knowledge and skills are more important assets. It promotes tapping into collective wisdom through collaboration and sharing on internal social platforms like wikis and blogs to drive innovation.
This document discusses using social media effectively in the workplace. It notes that using social media internally requires understanding how it is used externally. It addresses concerns about the risks of social media use and argues that knowledge is valuable but web fluency is also an important skill. It provides examples of how social media like wikis and blogs can unlock value through collaboration and sharing expertise.
Learn about LinkedIn’s consumer and content strategies and why they matter to you.
Subscribe to the LinkedIn Talent Blog: http://linkd.in/18yp4Cg
Follow the LinkedIn company page: http://linkd.in/1f39JyH
Tweet with us: http://bit.ly/HireOnLinkedIn
Learn more about LinkedIn Talent Solutions: http://linkd.in/1bgERGj
The document discusses why securing the internet is so difficult by examining internet successes and failures. It argues that internet security has failed because there is no single authority, success is unattainable in complex systems, and partial solutions are inadequate. Additionally, shared problems belong to nobody, risk is difficult to mitigate when benefits are unseen, and it is hard to define what "secure" even means at internet scale. Overall, the document analyzes technical, economic, and human factors that contribute to the ongoing challenges of internet security.
The document summarizes a presentation about how content management systems like Microsoft SharePoint can be limiting, and how social software provides advantages. The presentation argues that SharePoint focuses too much on content storage and not enough on enabling open conversations and knowledge sharing among people. In contrast, social systems allow ideas to be shared more openly across broader audiences and perspectives to move organizations from simply storing information to becoming more collaborative and social.
IBM Skills - Practical & Digital Skills for the Future of WorkDr. Melissa Sassi
The document discusses developing digital skills and practical experience, which are described as the two key ingredients for a "secret sauce" for careers. It promotes attending hackathons, coding camps, internships, volunteering, apprenticeships, meetups, and workshops to gain practical skills. Digital skills are defined as skills in areas like identity, use, safety, security, emotional intelligence, communication, literacy, rights, and life skills. The document encourages testing one's digital literacy score and finding one's passions to guide skill development activities.
Resume Tips for Prospective Presidential Management Fellows (PMFs)Andrew Krzmarzick
This presentation was hosted as a Google+ On-Air Hangout on November 15, 2012, to help applicants to the Presidential Management Fellow (PMF) Program in preparing their resume.
The recording is found at https://www.youtube.com/watch?feature=player_embedded&v=AygJ3iruJrw
This Assessment
Preparation Guide (“Guide”) will help you prepare for the rigorous assessment process used by the U.S. Office
of Personnel Management (OPM) to select a diverse PMF candidate pool. This guide is specific to the 2013
Presidential Management Fellows (PMF) Program assessment process and will familiarize potential applicants with its key features so that they know what to expect and are prepared to perform well.
You Can’t Buy Security
Building an Open Source Information Security Program
The document provides guidance on building an open source information security program through focusing on people, process, and technology. It emphasizes understanding the business first before implementing any security controls. The key steps outlined are:
1) Perform an information classification to understand what needs to be protected without using arbitrary values.
2) Draft security policies and procedures that are short, concise and relevant to the business.
3) Implement basic security controls like access controls, application security, network security, and operational controls using open source tools rather than purchasing products.
The presentation provides practical advice on building a security program from the ground up with an emphasis
Digital identity refers to the persona one develops through online activities and digital engagement. It can be easily influenced by social media posts, likes, and interactions, which shape others' perceptions. While a digital identity brings pressure to curate a positive online image, it can also be managed by being selective about what is shared, where it is shared, and with whom one connects online. With care, our digital identities can support rather than hinder our real identities.
The document discusses visualization and providing the big picture. It introduces The Big Picture company which helps visualize information through various methods like infographics, data visualization, and sketchnoting. Visualization is important because it helps people understand complex topics, focus on key details, share information more easily, and process visuals faster than text. The company's process involves reading the information, validating key details, and designing visualizations to help represent the most important aspects of the topic.
The document discusses strategies for building revenue generating websites, including teaching others how to do so. It promotes a program that guarantees 15-22% returns and shares revenue from websites that have received over 160 million views. The document then outlines four strategies for increasing online credibility and revenue: 1) adding social proof like testimonials and media coverage, 2) establishing an online "suit" or professional presence through platforms like Google+, LinkedIn, Facebook, and Twitter, 3) using Google AdWords to find profitable topics to write about, and 4) focusing websites on clearly meeting consumer needs and search demands.
Where Is Your #DigitalGenius Hiding? Digital strategy in the age of digital m...Doyle Buehler
Where Is Your #DigitalGenius Hiding? Digital strategy in the age of digital marketing by Doyle Buehler
Doyle is a world authority on digital transformation, a best selling author, podcaster, teacher and entrepreneur. He has consulted, coached, taught and inspired many in the areas of digital leadership, online marketing, social selling, social media marketing & digital strategy.
Doyle plays at the intersections of entrepreneurship and digital innovation, and has spent the past 16 years in the business world with multiple businesses and startups from around the world. He positions these digital leaders to think in a clearer, logical, more strategic manner for evolving their business.
Doyle host’s an iTunes podcast, Breaking.Digital, where he interviews digital marketing influences from around the world, discussing digital strategy and branding for B2B & B2C, and is a judge on the 2019 “Canadian Marketing Association Awards” and the “Australian Web Industry Association Awards
This document provides an overview of strategies for building revenue generating websites, including teaching others how to build or buy such sites. It discusses generating millions in annual revenue from over 600 websites with 160 million annual views. Key strategies highlighted include allowing others to participate for a percentage of revenue in perpetuity, and contractually guaranteeing high revenue percentages. The document emphasizes focusing on what today's information needs are rather than theories, and credibility, popularity and authority online often determining overall income levels.
Mosaic Theory of Information Security: For Technical WritersMargaret Fero
In finance, a concept called mosaic theory says that non-material information in sufficient quantities can be combined to constitute useful information. Investment analysts using this principle combine non-material information to develop significant insights into companies’ upcoming results without verging into insider trading.
In other words, a lot of insignificant details, like you might include in your documentation or share to social media, can be combined to deduce significant aspects of your or your organization’s private data. In non-financial information security, a similar principle applies. Small divergences from usual patterns can, when combined together, give a competitor or potential attacker hints about your organization’s strategy, upcoming product launches, or your private personal information.
In this talk, we discuss types of information you want to avoid posting about yourself or your organization to avoid unintentional disclosures.
Red vs. Blue Why we’ve been getting it wrong for 25 yearsEC-Council
Regarded as one of the world’s foremost experts on counter threat intelligence within the Information security industry, Chris Roberts constructs and directs a portfolio of defense services designed to improve the physical and digital security posture of both enterprise and government clients. With increasingly sophisticated attacks on targets of opportunity, Roberts’ unique methods of addressing the evolving threat matrix and experience with all information systems make him an indispensable partner to clients and industries that demand protection of financials, intellectual property, customer data and other protected information from attack.
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...Santhosh Tuppad
As technology evolved, software security faced huge challenges and as the years passed, the world has seen drastic changes far too quickly. And along with these advancements, even black-hat hackers or malicious hackers have evolved also very well. Today, the internet is the place for everyone where hackers dwell almost all the time. Every day new applications are released to the web and users start using them and even get addicted to them due to outstanding UX. But, wait! Did someone think about the "security" layer of these applications? Well, we often don’t and most of the applications today suffer from "beggarly / bad security".
In this talk, Santhosh Tuppad will focus on the pitfalls of bad security and why software security has failed in a pretty way. He will also shed light on how your users may be facing bigger problems than you can imagine due to bad software that lacks security testing. He will also demonstrate some of the lethal problems that exist in the industry and will talk about technical impact, business impacts like reputation damage, revenue loss and a lot more.
Not only that, Santhosh won’t end his talk without some hacking demonstrations that will for sure wow you. Finally, he will tell you how you can start security testing from day 1 and start contributing in terms of building secure software.
From this talk, you will gain an understanding about the problems that a lack of security testing presents and you find out about tool-assisted security testing; performing security tests through questioning. After the talk, you will be able to start identifying risks and report comm.on vulnerabilities giving you a feeling of “I can do this”
The document discusses how businesses can promote creativity within their organizations. It argues that traditional business structures often stifle creativity, but creativity is important for competitive advantage. It suggests that businesses focus on their people by encouraging open communication, sharing of ideas, and social interactions. This allows for "knowledge accidents" where people connect and new ideas emerge. The document provides specific recommendations for using tools like discussion forums, blogs, and social media to open conversations and sharing within an organization in order to promote innovation.
Digital Transformation Trends 2020 - What's Your Digital Strategy With Doyle ...Doyle Buehler
Digital Transformation Trends 2020 - What's Your Digital Strategy With Doyle Buehler
Get your PDF outlining the five core trends that will affect your business in 2020.
You may be surprised at what is coming, but also what is already here and what you have to deal with.
Trends are like glaciers - they don't really care who you are or what you do, or even if you try to move them out of the way - the bottom line is you can't move them, yet they can affect you greatly if you're not tuned into them properly, and understand why they are important.
Stop tinkering with your marketing in 2020. Make a positive change forward and find out what you need to know to make everything "click" online.
Put your best business forward find out what is most important to tune in to in the coming months, years and new decade.
Give yourself the help that you deserve with a complete and comprehensive roadmap for the future of your business.
Download now http://digitalmarketingtrends2020.respond.ontraport.net/
Put your best business forward and start planning your digital strategy.
Get started with defining your baseline and developing your digital genius and get a free copy of #Breakthrough: Unleash Your Remarkable Brand Value, Influence & Authority.
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...Dana Gardner
Transcript of a discussion on how the rapid shift to remote work accelerated the digital transformation of a New York-based publishing organization to reduce risk while preserving a highly creative and distributed culture.
Be a Modern Recruiter: Automate Your Pipeline with Your Brand | Talent Connec...LinkedIn Talent Solutions
This document discusses how to build and leverage an employer brand through social media and talent branding. It recommends automating the talent pipeline by defining the employee value proposition, developing engaging content for careers sites and social media, and showcasing employee stories. Metrics on job applications and hires through different platforms like LinkedIn, Facebook and YouTube are provided as examples of how to measure the impact of talent branding efforts.
This document discusses using social media effectively in the workplace. It notes that using social media internally requires understanding how it is used externally. It addresses common concerns about social media like wasted time but argues that knowledge and skills are more important assets. It promotes tapping into collective wisdom through collaboration and sharing on internal social platforms like wikis and blogs to drive innovation.
This document discusses using social media effectively in the workplace. It notes that using social media internally requires understanding how it is used externally. It addresses concerns about the risks of social media use and argues that knowledge is valuable but web fluency is also an important skill. It provides examples of how social media like wikis and blogs can unlock value through collaboration and sharing expertise.
Learn about LinkedIn’s consumer and content strategies and why they matter to you.
Subscribe to the LinkedIn Talent Blog: http://linkd.in/18yp4Cg
Follow the LinkedIn company page: http://linkd.in/1f39JyH
Tweet with us: http://bit.ly/HireOnLinkedIn
Learn more about LinkedIn Talent Solutions: http://linkd.in/1bgERGj
The document discusses why securing the internet is so difficult by examining internet successes and failures. It argues that internet security has failed because there is no single authority, success is unattainable in complex systems, and partial solutions are inadequate. Additionally, shared problems belong to nobody, risk is difficult to mitigate when benefits are unseen, and it is hard to define what "secure" even means at internet scale. Overall, the document analyzes technical, economic, and human factors that contribute to the ongoing challenges of internet security.
The document summarizes a presentation about how content management systems like Microsoft SharePoint can be limiting, and how social software provides advantages. The presentation argues that SharePoint focuses too much on content storage and not enough on enabling open conversations and knowledge sharing among people. In contrast, social systems allow ideas to be shared more openly across broader audiences and perspectives to move organizations from simply storing information to becoming more collaborative and social.
IBM Skills - Practical & Digital Skills for the Future of WorkDr. Melissa Sassi
The document discusses developing digital skills and practical experience, which are described as the two key ingredients for a "secret sauce" for careers. It promotes attending hackathons, coding camps, internships, volunteering, apprenticeships, meetups, and workshops to gain practical skills. Digital skills are defined as skills in areas like identity, use, safety, security, emotional intelligence, communication, literacy, rights, and life skills. The document encourages testing one's digital literacy score and finding one's passions to guide skill development activities.
Similar to The 6 Competencies of a Gov 2.0 Leader (20)
Resume Tips for Prospective Presidential Management Fellows (PMFs)Andrew Krzmarzick
This presentation was hosted as a Google+ On-Air Hangout on November 15, 2012, to help applicants to the Presidential Management Fellow (PMF) Program in preparing their resume.
The recording is found at https://www.youtube.com/watch?feature=player_embedded&v=AygJ3iruJrw
This Assessment
Preparation Guide (“Guide”) will help you prepare for the rigorous assessment process used by the U.S. Office
of Personnel Management (OPM) to select a diverse PMF candidate pool. This guide is specific to the 2013
Presidential Management Fellows (PMF) Program assessment process and will familiarize potential applicants with its key features so that they know what to expect and are prepared to perform well.
How Government Employees Use Social Networks for ProductivityAndrew Krzmarzick
Based on surveys conducted in July and August 2012, GovLoop learned about the professional networking and collaboration activities of public sector professionals on social networks like LinkedIn and GovLoop. To learn more, please visit http://www.govloop.com
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
Keynote address for the National Conference of State Legislatures (NCSL) Luncheon for Legislative Information and Communications Staff and National Association of Legislative Information Technology professionals on October 10, 2012.
The document outlines a framework for developing a 21st century communications plan using a 7 P's approach of purpose, people, plan, produce, promote, participate, and progress to effectively engage citizens through various online and social media channels. It provides examples of how different government entities have used tools like websites, mobile apps, social media, and video to communicate with constituents. The presentation aims to help participants apply these strategies to address their own communications challenges.
Lecture on Open Government at Tel Aviv University on September 5, 2012. Event hosted by Transparency International - Israel and the Hartog School of Government,
The Crowdsourced Communicator: Never Think for Yourself AgainAndrew Krzmarzick
This document summarizes Andrew Krzmarzick's perspective on using social networks like GovLoop and LinkedIn to connect with colleagues in government. It argues that these platforms can serve as perpetual online conferences, allowing government professionals to strategically position themselves as experts, connect with peers facing similar issues, and start online communities in areas where none previously existed. Forming these connections can help individuals and their agencies access insights, find collaborators, and become more effective in their roles. The document provides tips on how to use networks like GovLoop to become a "crowdsourced communicator" and a "government rockstar."
Gov 2.0 for Environmental Protection Agency and Executive Women in GovernmentAndrew Krzmarzick
Slide deck used for two presentations on same day - morning session for the Environmental Protection Agency and afternoon session for the Executive Women in Government organization. Delivered on Thursday, November 5, 2009. For more information, please visit http://www.govloop.com and http://www/genshift.com.
Presentation for the Chicago Federal Executive Board delivered in Chicago on November 9, 2009. For more information, please visit http://www.govloop.com or http://www.genshift.com.
Gov 2.0 for Honolulu-Pacific FEB and AGA-ASMC ConferenceAndrew Krzmarzick
Presentation delivered to the Honolulu-Pacific Federal Executive Board and the Association of Goverment Accountants (AGA)/American Society of Military Comptrollers (ASMC) Conference in Honolulu, HI in October 2009.
The document discusses the transition from traditional "Government 1.0" to a new model of "Government 2.0" that utilizes modern web tools and citizen engagement to solve complex problems. It argues that with the infrastructure of Web 2.0, government no longer needs to work alone and can engage citizens to provide public value. The emergence of Government 2.0 aims to make government more open, collaborative, and transparent by using tools like wikis, blogs, video sharing, and social networking.
This document discusses the importance of Government 2.0 and adopting Web 2.0 tools to make government more open, collaborative, and efficient. It provides examples of how agencies can use wikis, blogs, podcasts, social networking, and other online tools to engage with the public, leverage collective intelligence, and streamline internal processes. The document encourages agencies to think about why, who, what, when, and how they can implement these new technologies as part of their mission to better serve constituents.
Web 2.0 for Texas State Certified Public Manager (CPM)Andrew Krzmarzick
Presentation delivered for the Texas State Certified Public Manager (CPM) Program in Levelland, TX in June 2009. Similar to other presentations here, but includes some Texas-specific examples of social media being used by government.
Web 2.0 Measurement: Open Government Innovations ConferenceAndrew Krzmarzick
Presentation delivered at the Open Government and Innovations (OGI) Conference in Washington, DC, on July 22, 2009. Outlines the ways in which government has measured its web presence in a "1.0" context, including an overview of the measurement activities conducted by Brookings Institution, Foresee, Forrester and the e-Government Act of 2002.
Slides from a presentation for the National Nuclear Security Administration's Summer Student Intern Program. Provides an overview of "Never Eat Alone" by Keith Ferrazzi and "Good in a Room" by Stephanie Palmer. Includes tips for applying these principles to LinkedIn and Twitter as well.
The key steps to developing a social media strategy are to 1) tie social media goals to the organization's mission and objectives, 2) decide which tools best meet those goals, 3) develop engaging content, 4) assign owners and define the audience, and 5) create an implementation and evaluation schedule. The strategy should leverage various social media tools like blogs, videos, podcasts, and social networking.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
The 6 Competencies of a Gov 2.0 Leader
1. What We Expect from
Gov 2.0 Leadership
Potomac Forum Gov 2.0
Best Practices Symposium
Andrew Krzmarzick
Senior Project Coordinator
GraduateSchool.edu