An in-depth look at the trends in events technology, the statistics that prove its viability, and the tools that are making events more engaging, empowering, and energetic...turning them into experiences.
One year after the launch of the iPad in Belgium (and several other Tablets available) as a strong increase of the usage of Smartphones, Mobile Internet is a major trend in the digital world. We observe important consequences for media consumption and for advertising. Concretely, what is the situation in Belgium ? (presentation illustrated with exclusive datas and insights, and a link to a White Paper about Mobile marketing)
One year after the launch of the iPad in Belgium (and several other Tablets available) as a strong increase of the usage of Smartphones, Mobile Internet is a major trend in the digital world. We observe important consequences for media consumption and for advertising. Concretely, what is the situation in Belgium ? (presentation illustrated with exclusive datas and insights, and a link to a White Paper about Mobile marketing)
Want to learn how to create partnerships with local schools to help shape healthier and more safe communities? This presentation takes you step-by-step through the process of implementing a Shared Use campaign in your community to help keep schools open as centers of activity for families from all walks of life.
Symantec’s 2010 Global SMB Information Protection Survey found that small and midsized businesses (SMBs with 10 to 499 employees) are now making protecting their information their highest IT priority, as opposed to 15 months ago when a high percentage had failed to enact even the most basic safeguards. This shift makes sense as SMBs are facing increased threats from cyber attacks, lost devices and loss of confidential or proprietary data.
The cost of creating video for the Web has plummeted, but it is still one of the most expensive elements of many Web site or Web 2.0 initiatives. Publishers want results—and it’s up to you to get them. In today’s world, your video needs to be in several places simultaneously, with great hooks bringing users back to your Web site. In this session you’ll learn how to become a hyper-syndicator, publishing your video to devices including cell phones, laptops, and televisions. Video publishing may start with an embed code, but so much more is possible—and this session will show you how to take advantage of the best opportunities available.
10 Social Media Thoughts for Integrated MarketingBryan McCarty
A presentation I gave at Wartburg College on November 22, 2011 at Wartburg College in Waverly, Iowa. The presentation was an open discussion about social media and integrated marketing.
Ipsos MediaCT: Business Elite Breakfast SeminarIpsos UK
July 2011: View James Torr’s presentation at our recent Breakfast Seminar focused on the Business Elite, looking at the evolution of this hard to reach group since the first BE:Europe survey in 1973.
Outsourcing Deal Activity – September 2012Everest Group
Transaction Intelligence (TI) Monthly report for September, 2012. This report provides a brief overview of the overall outsourcing market activity for the month and includes the following:
• Trailing three-month average of outsourcing deals
• Split of outsourcing deals by function and industry vertical
• Geographical split and analysis of the level of deal activity
• Key outsourcing deals signed in September 2012
We would be happy to receive your feedback on this report and/or on the TI offering.
Want to learn how to create partnerships with local schools to help shape healthier and more safe communities? This presentation takes you step-by-step through the process of implementing a Shared Use campaign in your community to help keep schools open as centers of activity for families from all walks of life.
Symantec’s 2010 Global SMB Information Protection Survey found that small and midsized businesses (SMBs with 10 to 499 employees) are now making protecting their information their highest IT priority, as opposed to 15 months ago when a high percentage had failed to enact even the most basic safeguards. This shift makes sense as SMBs are facing increased threats from cyber attacks, lost devices and loss of confidential or proprietary data.
The cost of creating video for the Web has plummeted, but it is still one of the most expensive elements of many Web site or Web 2.0 initiatives. Publishers want results—and it’s up to you to get them. In today’s world, your video needs to be in several places simultaneously, with great hooks bringing users back to your Web site. In this session you’ll learn how to become a hyper-syndicator, publishing your video to devices including cell phones, laptops, and televisions. Video publishing may start with an embed code, but so much more is possible—and this session will show you how to take advantage of the best opportunities available.
10 Social Media Thoughts for Integrated MarketingBryan McCarty
A presentation I gave at Wartburg College on November 22, 2011 at Wartburg College in Waverly, Iowa. The presentation was an open discussion about social media and integrated marketing.
Ipsos MediaCT: Business Elite Breakfast SeminarIpsos UK
July 2011: View James Torr’s presentation at our recent Breakfast Seminar focused on the Business Elite, looking at the evolution of this hard to reach group since the first BE:Europe survey in 1973.
Outsourcing Deal Activity – September 2012Everest Group
Transaction Intelligence (TI) Monthly report for September, 2012. This report provides a brief overview of the overall outsourcing market activity for the month and includes the following:
• Trailing three-month average of outsourcing deals
• Split of outsourcing deals by function and industry vertical
• Geographical split and analysis of the level of deal activity
• Key outsourcing deals signed in September 2012
We would be happy to receive your feedback on this report and/or on the TI offering.
A global consumer survey on mobile security by Juniper Networks with KRC Research and Synovate. The survey was conducted online in October 2010, with more than 6,000 self-identified smartphone and tablet users from a pool of 16,000 consumers across 16 countries, including the United States, Canada, Brazil, UK, France, Germany, Italy, Netherlands, Belgium, Russia, China, India, Australia, Hong Kong, Singapore and Japan.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. @TheEventNerd
Be afraid. Be not so afraid. #DigEvEx
#TSE2013
“It might not work when I need it to…”
“It’ll replace the client’s need for me.”
“It’s
too
hard.
Where
do
I
start?”
9. 2007 54% 2009 78% 2006 59%
2008 51% 2010 69% 2007 57%
2009 64% 2011 53% 2008 59%
2010 71% 2012 49% 2009 81%
2011 64% 2013 45% 2010 78%
2012 2011 73%
@TheEventNerd
Strategery
63%
2013 My own company’s uncertain 2012 69%
68%
Shorter lead times
finances
2004 17%
2013 61% #DigEvEx
2004 43% 2005 17% An uncertain economy #TSE2013
2005 40% 2006 18% finances
2006 42% 2007 19% 2004 79%
2007 43% 2008 17% 2005 64%
2008 32% 2009 26% 2006 50%
2009 19% 2010 27% 2007 49%
2008
How do you get them to try?
2010 34% 2011 21%
2009
57%
88%
2011 25% 2012 18%
2012 60% 2013 24% 2010 77%
2011 70%
1.
Iden=fy
the
problem/need
Dealing with my company’s
2013 32%
2012 69%
Labor shortage/lack of procurement/purchasing
department 2013 65%
skilled labor
2004 29% 2004 n/a Increased competition
2.
Iden=fy
the
real
problem/need
2005 28% 2005
2006
16%
14%
2004 42%
2006 26% 2005 39%
2007 30% 2007 14% 2006 41%
2008 23% 2008 13% 2007 49%
2009 6%
3.
Define
success
for
the
event/technology
2009 14% 2008 39%
2010 19% 2010 9% 2009 25%
2011 18% 2011 10% 2010 31%
-‐
How
are
you
tracking
that
success?
2012 20% 2012 9% 2011 33%
2013 14% 2013 11% 2012 37%
Demonstrating the value/ROI Coping with new technology 2013 42%
of special events 2004 6% Shorter lead times
2004 n/a 2005 9% 2004 n/a
2005 36% 2006 7% 2005 33%
2006 28% 2007 8% 2006 34%
2007 28% 2008 7% 2007 32%
2008 31% 2009 4% 2008 29%
2009 24% 2010 5% 2009 20%
2010 28% 2011 10% 2010 30%
2011 23% 2012 11% 2011 27%
2012 31% 2013 24% 2012 35%
2013 32%
2013 38%
10. isms @TheEventNerd
If at first you don’t succeed…
#DigEvEx
#TSE2013
11. isms @TheEventNerd
AIM for the puddles! #DigEvEx
#TSE2013
12. isms @TheEventNerd
Be a badass! #DigEvEx
#TSE2013
The Badass Creed (
(from UrbanDictionary.com)"
1. A Badass doesn’t talk about being a
badass. Period.
2. A badass doesn’t try to be a badass or look
tough. They simply are.
3. A badass is true to themselves.
4. A badass does not give up. Badasses
always push to be better.
5. A badass is not a jerk.
6. A badass knows their limits. You ain’t
Superman!
7. A badass doesn’t make enemies or go
looking for fights they can’t win.
14. @TheEventNerd
RFID
#DigEvEx
#TSE2013
• Collect
Content
-‐
Guests
use
RFID
tools
(such
as
RFID
enabled
wristbands
or
badges)
to
ac=vely
request
content
which
is
delivered
to
them
via
email,
SMS,
or
Facebook
=meline.
• Personalized
Engagements
-‐
Consumers
receive
content
that
is
based
on
their
interests,
age,
primary
language,
etc.
• Access
-‐
Guests
receive
special
event
access
as
part
of
a
clearly
defined
value
exchange.
• Share
Experiences
-‐
Guests
can
automa=cally
share
their
experiences
with
their
friends
through
social
media
by
simply
tapping
their
RFID
wristbands.
@FISHtechnology
@AccessPasses
15. @TheEventNerd
RFID
#DigEvEx
#TSE2013
REGISTER
AND
CHECK
IN
PHOTO
OPPS
SOCIAL
SHARING/VOTING
AUTO
POSTS
ON
SOCIAL
MEDIA
THEMED
PHOTO
AREAS
18. The Digital Event Experience
• We are uniquely positioned to do more than create events people forget.
• We should strive to create experiences people connect with and hang onto for a
lifetime. Technology is just one of the ways we can do that
• Try something new today. Step out of the comfort of the events we’ve always done
• Feel free to email me with any questions
Final Thoughts
19. @TheEventNerd
Social Seating
Experience Imperative
The
#eiapproved
Final Thoughts
• Event
tech
is
about
the
ME
in
the
Media
• Personaliza=on
is
key
• It’s
an
old
phrase
but…People
care
about
your
cool
tools
when
you
care
about
them
(AKA
don’t
just
use
tech
because
you
can-‐
have
a
purpose)
• May
the
(crowd)source
be
with
you
@TheEventNerd
20.
21. The Experience Imperative
Thanks to:
Special
Event
Magazine
(www.specialevents.com)
Event
Manager
Blog
(www.eventmanagerblog.com)
Event
Marke=ng
Ins=tute
(www.eventmarke=ng.com)
Ac=ve
Network
(www.ac=venetwork.com)
Expo
Magazine
(www.expoweb.com)
Eventbrite
(www.eventbrite.com)
J. Damany Daniel
@TheEventNerd
#DigEvEx
22. The Experience Imperative
Honorable Mentions
Social
Tables
(www.socialtables.com)
Bonfyre
(www.bonfyreapp.com)
PeopleHunt
(www.peoplehunt.me)
J. Damany Daniel
@TheEventNerd
#DigEvEx