Webinar presentation by Embry-Riddle Aeronautical University--Worldwide. Dr. Terri Maue shows how to be a better writer by understanding the "Three Knows."
This document provides an agenda and notes for a multigenre project presentation on uncovered selves. It summarizes an article by Kenji Yoshino about different phases of demands for assimilation faced by gay people, including conversion, passing, and covering. Covering refers to toning down stigmatized identities to fit in. The document discusses Yoshino's argument that covering demands are faced by all civil rights groups. It outlines assignments for students to work on transitions in their multigenre projects, write conclusions, and prepare for a multigenre presentation day by developing presentation titles, a flyer, and invitation letter.
This document provides information about an online professional development session, including links to resources shared during the session. Participants are encouraged to test their audio setup before the session begins. The document lists several education technology tools and websites that were demonstrated and discussed, such as WordSift for creating tag clouds, The ZebraPrint blog by two sisters, and Foldables for hands-on classroom activities. Participants are invited to request a certificate for continuing education credit by completing a follow-up survey.
Eric Jones, a father of three, has developed a drinking habit over the years and has driven drunk many times without getting arrested. One night while drunk, he rear-ends another car and kills a young family of four. The document discusses the legal and moral issues surrounding drunk driving and fatal accidents, examining what is a fair punishment for Eric and how society can better address this problem. Students are asked to research the topic and write an essay arguing their position on how to make highways safer and what punishment is suitable when a family is killed by a drunk driver.
Here is a draft news story in one paragraph using the inverted pyramid structure:
The Batangas State University Main Campus I will be holding its annual ISEC Week celebration from September 14-18, according to BSU President Dr. Josefina Luces. "ISEC Week aims to promote the university's culture of excellence, integrity, service, and commitment to education," said Luces. The week-long celebration will feature various activities such as a parade of floats, cultural shows, and sports competitions. It will culminate in an awards ceremony where outstanding students, faculty, and departments will be recognized for their achievements and contributions to the university.
The document discusses inquiry-based learning and technologies that support it. It provides examples of how students can actively engage in inquiry projects to make sense of their experiences and integrate knowledge from diverse sources. Key aspects discussed include asking questions, gathering multiple types of materials, hands-on collaborative activities, dialogue and reflection.
Arc 211 American Diversity and Design Vincent ScozzaroVincent Scozzaro
This document summarizes an online course on diversity and design taken by the author. It includes an introduction describing how the course influenced the author's thinking. The rest of the document outlines the author's responses to weekly discussion questions from the course. It provides a link to the campus life page of the University at Buffalo, where the course was taken.
Leveraging Social Media for Student Engagement - Updated 8/8/11Swift Kick
These are our latest slides (8/8/11) for our presentation on how to leverage social media for increased student engagement intended for Student Leaders and Student Affairs Professionals. To learn more about Swift Kick, visit www.swiftkickonline.com.
This document provides an overview of secure software development practices. It discusses drivers of application security like risk management and compliance. It also covers security programs and maturity models, training developers, using security scanning tools, and procuring secure third-party applications. Key practices include integrating security into the SDLC, establishing coding standards, and aligning security testing with development iterations to find and fix vulnerabilities early. The goal is to make security part of standard development processes.
This document provides an agenda and notes for a multigenre project presentation on uncovered selves. It summarizes an article by Kenji Yoshino about different phases of demands for assimilation faced by gay people, including conversion, passing, and covering. Covering refers to toning down stigmatized identities to fit in. The document discusses Yoshino's argument that covering demands are faced by all civil rights groups. It outlines assignments for students to work on transitions in their multigenre projects, write conclusions, and prepare for a multigenre presentation day by developing presentation titles, a flyer, and invitation letter.
This document provides information about an online professional development session, including links to resources shared during the session. Participants are encouraged to test their audio setup before the session begins. The document lists several education technology tools and websites that were demonstrated and discussed, such as WordSift for creating tag clouds, The ZebraPrint blog by two sisters, and Foldables for hands-on classroom activities. Participants are invited to request a certificate for continuing education credit by completing a follow-up survey.
Eric Jones, a father of three, has developed a drinking habit over the years and has driven drunk many times without getting arrested. One night while drunk, he rear-ends another car and kills a young family of four. The document discusses the legal and moral issues surrounding drunk driving and fatal accidents, examining what is a fair punishment for Eric and how society can better address this problem. Students are asked to research the topic and write an essay arguing their position on how to make highways safer and what punishment is suitable when a family is killed by a drunk driver.
Here is a draft news story in one paragraph using the inverted pyramid structure:
The Batangas State University Main Campus I will be holding its annual ISEC Week celebration from September 14-18, according to BSU President Dr. Josefina Luces. "ISEC Week aims to promote the university's culture of excellence, integrity, service, and commitment to education," said Luces. The week-long celebration will feature various activities such as a parade of floats, cultural shows, and sports competitions. It will culminate in an awards ceremony where outstanding students, faculty, and departments will be recognized for their achievements and contributions to the university.
The document discusses inquiry-based learning and technologies that support it. It provides examples of how students can actively engage in inquiry projects to make sense of their experiences and integrate knowledge from diverse sources. Key aspects discussed include asking questions, gathering multiple types of materials, hands-on collaborative activities, dialogue and reflection.
Arc 211 American Diversity and Design Vincent ScozzaroVincent Scozzaro
This document summarizes an online course on diversity and design taken by the author. It includes an introduction describing how the course influenced the author's thinking. The rest of the document outlines the author's responses to weekly discussion questions from the course. It provides a link to the campus life page of the University at Buffalo, where the course was taken.
Leveraging Social Media for Student Engagement - Updated 8/8/11Swift Kick
These are our latest slides (8/8/11) for our presentation on how to leverage social media for increased student engagement intended for Student Leaders and Student Affairs Professionals. To learn more about Swift Kick, visit www.swiftkickonline.com.
This document provides an overview of secure software development practices. It discusses drivers of application security like risk management and compliance. It also covers security programs and maturity models, training developers, using security scanning tools, and procuring secure third-party applications. Key practices include integrating security into the SDLC, establishing coding standards, and aligning security testing with development iterations to find and fix vulnerabilities early. The goal is to make security part of standard development processes.
Vendor management involves managing outside firms that provide goods or services to an organization. It is a process that includes onboarding vendors, annual re-evaluations, and off-boarding when relationships end. Key parts of the process include conducting due diligence, establishing service level agreements to define expectations, and performing security and privacy reviews. Vendor management aims to select partners effectively and ensure services meet requirements over the long term through active oversight and well-defined processes.
Hoe gaan je om met social media door medewerkers op de winkelvloer? Alles wat medewerkers over je winkel(s) melden via social media, heeft invloed op het imago van je bedrijf. Wat wil je wel of niet toestaan? En in hoeverre heb je hierin een keuze?
This document discusses reverse engineering thick-client applications. It begins with an overview of thick clients, noting they provide local software that connects to server software via TCP/IP sockets. It describes the attack surface of thick clients, including potential for rootkits, cache/registry corruption, and information disclosure due to local software and storage. Tools that can be used for reverse engineering thick clients are also outlined, such as decompilers, profilers, proxies and sniffers. An example reverse engineering process using these tools on a Java thick client is then provided.
This document provides an overview of handling mobile devices in the public sector. It discusses the rise of mobile computing and BYOD programs. It provides guidance on developing mobile security policies and case studies on implementing mobile device management. The case study of Fairfax County Public Schools is presented, which implemented a BYOD program for 180k students and 23k staff using iOS, Android and Blackberry devices managed through an MDM solution. Lessons learned included choosing battles carefully, having policy in place first, and future plans for malware detection and app whitelisting.
Passion, Persistence, and Patience: The Search for Amelia EarhartERAUWebinars
The document provides information about an upcoming webinar from Embry-Riddle Aeronautical University on the search for Amelia Earhart, including the date, time, speaker Jon Thompson's background working to solve the mystery, and pointers for participating. It also lists an upcoming webinar in May on career planning and one in June on project management risk.
This is a webinar presented April 14, 2015 by Embry-Riddle Aeronautical University and featuring noted safety expert Dr. Mark Friend. Dr. Friend looks at the topic, "How to make safety work in your company."
The document appears to be about a high school in Centralia, a ghost town, where sick people left one step at a time. It references change and that everyone went somewhere today.
This document discusses securing IoT medical devices. It begins with an overview of IoT and related medical concepts. It then discusses vulnerabilities like denial of service attacks and data leaks. The document advocates for security and privacy by design principles like access controls, encryption, threat modeling and compensating controls. It concludes by calling for national standards and certification to improve security of IoT medical devices.
This document discusses Single Sign-On (SSO) including the pros and cons. It provides an overview of SSO and different standards and categories used for SSO. It discusses issues around ownership and implementation of SSO. Challenges with SSO requirements based on users, applications, and synchronization are outlined. Examples of SSO needs in different industries are also presented. The document concludes with considerations for the future direction of SSO.
The document discusses security challenges posed by new technologies like digital currencies and big data, and proposes technical solutions like homomorphic encryption and stateless tokenization. It notes legacy crypto systems may not adequately secure big data, and new attacks target sensitive data, wallet keys, and single points of failure. The presentation then outlines homomorphic encryption and stateless tokenization as technical solutions that allow processing of encrypted data and separation of keys from data. It concludes big data and digital currencies require security of data, keys, and objects.
This document provides an overview of cloud computing and its implications for municipal records management. It discusses key cloud concepts, service models, deployment models, and the business case for cloud adoption. It also covers security guidance and selecting cloud service providers, with a focus on records and information management requirements. Two case studies of municipal cloud implementations are presented: IlliniCloud and Washington D.C.'s adoption of Google Apps and Drive for storage. Lessons learned and next steps are discussed for optimizing records management in the cloud.
Maot Chitim of Greater Chicago has provided food packages for Passover and Rosh Hashanah to needy Jewish families in the area since 1908. It began with Rabbis distributing money but switched to food packages, which now serve over 4,800 families. Volunteers pack and deliver the food, which aims to help families observe the holidays in a traditional and dignified manner. The organization relies on donations and volunteers to carry out its important work of ensuring no one goes hungry during these holidays.
ERAU Webinar Slides: Global Business Environment--China TripERAUWebinars
This document outlines an experimental class called MSLD 595 Understanding the Global Business Environment offered by Embry-Riddle Aeronautical University. The class consists of online modules followed by a 9-day trip to China to interact with students, businesses, and government officials. The trip to China includes visits to factories, universities, cultural sites, and meetings with professionals in Beijing and Shanghai. The total estimated cost for students to take the class is $4000 which covers tuition, travel to China, lodging, food, and local transportation during the trip. Contact information is provided for questions about the class or webinar series.
Alpha and Omega: Program Outcomes to the CapstoneERAUWebinars
This is from a webinar presented by Embry-Riddle Aeronautical University-Worldwide called “Alpha and Omega: Program Outcomes to the Capstone.” The presenter is Scott Burgess.
This document summarizes two case studies on using cloud technologies for e-discovery. Case study 1 involved using a SaaS solution for discovery within a financial services firm. It faced challenges from lack of planning, training, and discovery expertise. Case study 2 involved discovery from cloud email archives at a capital management firm. It highlighted complications from journaling cloud email and the need to test disaster recovery. The document also reviews benefits and concerns of cloud e-discovery, including cost, flexibility, and vendor management issues. It provides examples of SaaS, PaaS and IaaS solutions for e-discovery in the cloud.
The document summarizes reasons employees give for working at NetApp IT. It highlights that employees value (1) a collaborative work environment based on trust where they can continuously learn and get things done, (2) the ability to strategize and execute large projects globally to support customers, and (3) taking personal responsibility to contribute to the team's success.
The document discusses securing databases in the cloud. It provides an overview of database types, cloud database solutions, vulnerabilities, and how to secure relational and non-relational cloud databases. It also discusses privacy and a case study of implementing MySQL and SimpleDB in the cloud for a healthcare provider.
The document discusses the Friends of Jaclyn Foundation (FoJ), a non-profit that pairs children with pediatric brain tumors with college and high school athletic teams. FoJ aims to improve children's quality of life through the love and support of athletes. It has formed relationships between thousands of children and over 500 teams nationally. The relationships inspire both children and athletes, helping children feel hope during treatment and athletes gain perspective on life.
This document discusses strategies for designing and deploying industrial control system (ICS) honeypots. It outlines different ICS componentry that can be emulated in honeypots, such as programmable logic controllers and distributed control systems. Two main honeypot deployment strategies are described - thick deployments that emulate a full system and thin deployments that act as traffic reflectors at larger scale. Both open-source and commercial honeypot solutions are presented, along with options for analytics and deception maneuvers like bastion hosts and VLANs. The document provides an overview of designing and deploying ICS honeypots to detect threats targeting industrial infrastructure.
The document provides instructions for how to request and receive help with an assignment from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Receive the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with the option of a refund for plagiarized work. The document aims to clearly explain the process for obtaining writing help from the site.
Quick tips for choosing a topic for argumentative essayslevibaxter
An argumentative essay requires you to put forth an argument on a topic, collect and present evidence to support the argument. Considered as an analytical piece of writing, an argumentative essay can be a tough nut to crack. However, once you finalize on a topic and conduct the necessary background research, putting words to paper following a rational stream of arguments becomes much easier. These kinds of essays require a lot of in-depth research and a careful perusal of all the perspectives or arguments for and against a particular stance. Empirical evidence, such as statistics and results of previous research, is indispensable when composing a winning argumentative essay. Since choosing a topic for your argumentative essay is the first hurdle that you have to overcome, we have collected some ideas and topics that you might be able to put to use for your assignment to impress your professors and secure superb grades!
Refrence Link:
https://myassignmenthelp.com/blog/good-topics-for-argumentative-essays/
https://myassignmenthelp.com/Home/
Mail Id: contact@myassignmenthelp.com
Vendor management involves managing outside firms that provide goods or services to an organization. It is a process that includes onboarding vendors, annual re-evaluations, and off-boarding when relationships end. Key parts of the process include conducting due diligence, establishing service level agreements to define expectations, and performing security and privacy reviews. Vendor management aims to select partners effectively and ensure services meet requirements over the long term through active oversight and well-defined processes.
Hoe gaan je om met social media door medewerkers op de winkelvloer? Alles wat medewerkers over je winkel(s) melden via social media, heeft invloed op het imago van je bedrijf. Wat wil je wel of niet toestaan? En in hoeverre heb je hierin een keuze?
This document discusses reverse engineering thick-client applications. It begins with an overview of thick clients, noting they provide local software that connects to server software via TCP/IP sockets. It describes the attack surface of thick clients, including potential for rootkits, cache/registry corruption, and information disclosure due to local software and storage. Tools that can be used for reverse engineering thick clients are also outlined, such as decompilers, profilers, proxies and sniffers. An example reverse engineering process using these tools on a Java thick client is then provided.
This document provides an overview of handling mobile devices in the public sector. It discusses the rise of mobile computing and BYOD programs. It provides guidance on developing mobile security policies and case studies on implementing mobile device management. The case study of Fairfax County Public Schools is presented, which implemented a BYOD program for 180k students and 23k staff using iOS, Android and Blackberry devices managed through an MDM solution. Lessons learned included choosing battles carefully, having policy in place first, and future plans for malware detection and app whitelisting.
Passion, Persistence, and Patience: The Search for Amelia EarhartERAUWebinars
The document provides information about an upcoming webinar from Embry-Riddle Aeronautical University on the search for Amelia Earhart, including the date, time, speaker Jon Thompson's background working to solve the mystery, and pointers for participating. It also lists an upcoming webinar in May on career planning and one in June on project management risk.
This is a webinar presented April 14, 2015 by Embry-Riddle Aeronautical University and featuring noted safety expert Dr. Mark Friend. Dr. Friend looks at the topic, "How to make safety work in your company."
The document appears to be about a high school in Centralia, a ghost town, where sick people left one step at a time. It references change and that everyone went somewhere today.
This document discusses securing IoT medical devices. It begins with an overview of IoT and related medical concepts. It then discusses vulnerabilities like denial of service attacks and data leaks. The document advocates for security and privacy by design principles like access controls, encryption, threat modeling and compensating controls. It concludes by calling for national standards and certification to improve security of IoT medical devices.
This document discusses Single Sign-On (SSO) including the pros and cons. It provides an overview of SSO and different standards and categories used for SSO. It discusses issues around ownership and implementation of SSO. Challenges with SSO requirements based on users, applications, and synchronization are outlined. Examples of SSO needs in different industries are also presented. The document concludes with considerations for the future direction of SSO.
The document discusses security challenges posed by new technologies like digital currencies and big data, and proposes technical solutions like homomorphic encryption and stateless tokenization. It notes legacy crypto systems may not adequately secure big data, and new attacks target sensitive data, wallet keys, and single points of failure. The presentation then outlines homomorphic encryption and stateless tokenization as technical solutions that allow processing of encrypted data and separation of keys from data. It concludes big data and digital currencies require security of data, keys, and objects.
This document provides an overview of cloud computing and its implications for municipal records management. It discusses key cloud concepts, service models, deployment models, and the business case for cloud adoption. It also covers security guidance and selecting cloud service providers, with a focus on records and information management requirements. Two case studies of municipal cloud implementations are presented: IlliniCloud and Washington D.C.'s adoption of Google Apps and Drive for storage. Lessons learned and next steps are discussed for optimizing records management in the cloud.
Maot Chitim of Greater Chicago has provided food packages for Passover and Rosh Hashanah to needy Jewish families in the area since 1908. It began with Rabbis distributing money but switched to food packages, which now serve over 4,800 families. Volunteers pack and deliver the food, which aims to help families observe the holidays in a traditional and dignified manner. The organization relies on donations and volunteers to carry out its important work of ensuring no one goes hungry during these holidays.
ERAU Webinar Slides: Global Business Environment--China TripERAUWebinars
This document outlines an experimental class called MSLD 595 Understanding the Global Business Environment offered by Embry-Riddle Aeronautical University. The class consists of online modules followed by a 9-day trip to China to interact with students, businesses, and government officials. The trip to China includes visits to factories, universities, cultural sites, and meetings with professionals in Beijing and Shanghai. The total estimated cost for students to take the class is $4000 which covers tuition, travel to China, lodging, food, and local transportation during the trip. Contact information is provided for questions about the class or webinar series.
Alpha and Omega: Program Outcomes to the CapstoneERAUWebinars
This is from a webinar presented by Embry-Riddle Aeronautical University-Worldwide called “Alpha and Omega: Program Outcomes to the Capstone.” The presenter is Scott Burgess.
This document summarizes two case studies on using cloud technologies for e-discovery. Case study 1 involved using a SaaS solution for discovery within a financial services firm. It faced challenges from lack of planning, training, and discovery expertise. Case study 2 involved discovery from cloud email archives at a capital management firm. It highlighted complications from journaling cloud email and the need to test disaster recovery. The document also reviews benefits and concerns of cloud e-discovery, including cost, flexibility, and vendor management issues. It provides examples of SaaS, PaaS and IaaS solutions for e-discovery in the cloud.
The document summarizes reasons employees give for working at NetApp IT. It highlights that employees value (1) a collaborative work environment based on trust where they can continuously learn and get things done, (2) the ability to strategize and execute large projects globally to support customers, and (3) taking personal responsibility to contribute to the team's success.
The document discusses securing databases in the cloud. It provides an overview of database types, cloud database solutions, vulnerabilities, and how to secure relational and non-relational cloud databases. It also discusses privacy and a case study of implementing MySQL and SimpleDB in the cloud for a healthcare provider.
The document discusses the Friends of Jaclyn Foundation (FoJ), a non-profit that pairs children with pediatric brain tumors with college and high school athletic teams. FoJ aims to improve children's quality of life through the love and support of athletes. It has formed relationships between thousands of children and over 500 teams nationally. The relationships inspire both children and athletes, helping children feel hope during treatment and athletes gain perspective on life.
This document discusses strategies for designing and deploying industrial control system (ICS) honeypots. It outlines different ICS componentry that can be emulated in honeypots, such as programmable logic controllers and distributed control systems. Two main honeypot deployment strategies are described - thick deployments that emulate a full system and thin deployments that act as traffic reflectors at larger scale. Both open-source and commercial honeypot solutions are presented, along with options for analytics and deception maneuvers like bastion hosts and VLANs. The document provides an overview of designing and deploying ICS honeypots to detect threats targeting industrial infrastructure.
The document provides instructions for how to request and receive help with an assignment from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Receive the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with the option of a refund for plagiarized work. The document aims to clearly explain the process for obtaining writing help from the site.
Quick tips for choosing a topic for argumentative essayslevibaxter
An argumentative essay requires you to put forth an argument on a topic, collect and present evidence to support the argument. Considered as an analytical piece of writing, an argumentative essay can be a tough nut to crack. However, once you finalize on a topic and conduct the necessary background research, putting words to paper following a rational stream of arguments becomes much easier. These kinds of essays require a lot of in-depth research and a careful perusal of all the perspectives or arguments for and against a particular stance. Empirical evidence, such as statistics and results of previous research, is indispensable when composing a winning argumentative essay. Since choosing a topic for your argumentative essay is the first hurdle that you have to overcome, we have collected some ideas and topics that you might be able to put to use for your assignment to impress your professors and secure superb grades!
Refrence Link:
https://myassignmenthelp.com/blog/good-topics-for-argumentative-essays/
https://myassignmenthelp.com/Home/
Mail Id: contact@myassignmenthelp.com
Digital Media in Building Trades Organizing Alex Hogan
This document discusses how digital media can help with union organizing efforts. It provides tips on developing digital organizing plans, using social media platforms like Facebook and Twitter for organizing, and creating visual content. Some key points covered include drafting goals and targeting audiences for a digital plan, using things like testimonials and facts to engage people online, and tips for taking photos and videos to help promote organizing campaigns.
Get Better Content with Analytics and User TestingMichael Powers
So you're going to Confab Higher Ed. You're already pretty excited about content strategy. But your boss and colleagues? Not so much. To outsiders, content strategy is just another buzzword. And as more schools move to become "data-driven" organizations, talking about content can sound hopelessly qualitative.
So don't say "content strategy": do it. This session will look at content strategy practices you can introduce to show even your most quantitatively-oriented colleagues the value of content strategy: content analytics, social media analytics, and user testing techniques. Rack up successes first—then start talking content strategy.
• Introduce content strategy practices into your organization when your organization doesn't care about content strategy.
• Use analytics to identify what needs improvement.
• Learn how user-testing techniques can improve your content.
Culture Change_Social Media & Communications Surgery_23rd JanJulie's Bicycle
Social Media & Communications Surgery: A Practical Guide To Ethical Brand Building
Know your #hashtags from your @mentions?
The difference between Replying and Retweeting?
If you want to learn all about the potential and pitfalls of social media from the comfort of your desk, come and join this free and practical Webinar where Julie's Bicycle will help you develop your online presence and effectively communicate your brand and ethics.
Learn about different social media platforms (the rules and jargon!) and social media strategic planning, with lots of creative and colourful examples of how arts organisations and practitioners have utilised social media to communicate their environmental actions, campaigns, and good practice. Communicating your business values demonstrates transparency, builds trust and opens new contacts and conversations.
As an outcome of the Webinar, Julie's Bicycle will also help you to create your very own environmental policy and action plan, so that you can document, share and communicate your good practice and aspirations.
Jackson Lee, Joshua Tan, Jasmine Battu on September 29, 2023
✨Unlock Your Creative Potential with Figma! Get ready to dive into the world of UI/UX design with our exciting workshop in collaboration with the ICCIT Council.
Whether you're a complete beginner or already have some design experience, this event is tailored just for you!
This event will cover creating accessible user interfaces design using Figma, and basic user experience principles that are usually taught in upper-year CCIT courses.
No prior experience is required; our goal is to provide a welcoming environment for everyone to learn and grow. Don't miss out on this unique opportunity to enhance your UI/UX skills and connect with like-minded peers. Mark your calendar, invite your friends, and see you there! 👋
IELTS Writing task 2 structuring , organizing and brainstormingShannon290101
Here is a sample outline for the answer:
THESIS: While money can contribute to happiness by enabling certain experiences and opportunities, true happiness comes from within and is not solely dependent on wealth.
I. Some believe money is important for happiness
A. Money enables travel, hobbies, and experiences
B. Money can pay for healthcare and children's needs
II. However, money cannot buy true happiness
A. Money cannot remove sorrow like grief or loss
B. Relationships and inner peace are more important than wealth
III. Happiness depends on both inner and outer factors
A. Money provides benefits to lifestyle and status
B. True happiness comes from within, not just wealth
C
Can I Use Twitter to Help My Career - TweetCamp San AntonioJim Adcock
This is the updated version of the presentation I gave at TweetCamp San Antonio in 2009. While the interface has changed some, the basics of using Twitter as an intelligence gathering and connection-making tool to aid your career have remained the same.
Webinar - Libraries As Innovation Hubs - 2017-05-31TechSoup
Public libraries are hubs for innovation and community engagement. Library workers must listen closely to community needs to design programs and services responsive to continuous changes in technology and fluctuations in funding. This free webinar showcases two examples of collaborative design events used in public libraries to generate ideas, build community, and solve problems.
Chris Kyauk talks about the Alameda County Library’s Innovation Fest, a collaborative team challenge for public library staff. The Innovation Fest was designed to help library staff become more comfortable with design processes and risk taking to better create solutions to serve library patrons.
Sarah Washburn shares Caravan Studio’s process for community centered design to develop technology solutions that solve real problems. This process has been successfully applied to projects with libraries as a key strategic collaborator, most recently in Indianapolis (IN).
This document discusses strategies for gaining community support through statistics, measurements, and stories to demonstrate impact. It introduces Stephen Abram and Kim Silk who will discuss using data and stories together, with data providing facts and measurements, and stories making data more human and memorable. The document emphasizes that both data and stories are needed to be effective and gain support. It also discusses some challenges with library data and how to address them.
My BU New Media Fall 2015 Class Slides - 2nd HalfTodd Van Hoosear
The document discusses a course on new media and public relations. It explores how new technologies like social media, blogs, and podcasting are changing public relations. The course covers interactive tools that are redefining the practice of public relations. It combines lectures, discussions, guest speakers, case studies, and research to help students understand the power of interactive media.
Professional Essay Writers For Hire - YouTubeMelissa Moore
The document discusses the psychodynamic theory approach used by Dr. Paul Weston in treating Sophie, a teenage gymnast seeing him after an accident. While Paul largely uses psychodynamic techniques, drawing on the patient's past and unconscious motivations, he also combines other universal therapeutic qualities and some cognitive methods. Key examples throughout Sophie's sessions illustrate Paul's emphasis on psychodynamics but blended approach. His goal is to convey reliable support to help Sophie understand her emotions, without criticism, in line with psychodynamic principles.
This document provides guidance on choosing an argumentative topic for a 3000 word paper. It suggests picking a topic that is interesting and important, on which people disagree, and can be narrowly focused. Some example types of argumentative topics are taking a stand on a controversy, evaluating something, or proposing a solution. The document also provides sources for finding topic ideas, such as academic interests, news sites, and discussing topics with professors. Students are warned to avoid topics that are too technical or require too much specialized research.
What is social media, and why should I care?David Griner
The document provides an overview of social media and how businesses can utilize various social media platforms. It discusses common social media tools like blogs, microblogging, social networks, and videos/photos. It then focuses on blogs and microblogging platforms like Twitter. For businesses, it emphasizes the importance of an authentic presence and engaging with influencers. Key platforms discussed include Facebook, MySpace, and Google alerts.
The document discusses various social media tools and platforms and their growing importance and influence. It provides information on popular social media activities like watching videos, reading blogs, and using social networks. Various social media platforms are described, including their pros and cons for businesses to utilize, such as blogs, Twitter, Facebook, and social networks. Strategies are suggested for businesses to effectively engage with bloggers and users on these various social media platforms.
The document provides guidance on writing effective content for the web. It discusses usability principles like using concise and scannable writing. It also covers digital best practices such as using short lengths between 500-750 words, incorporating imagery and calls to action. A key topic is creating shareable content by making it timely, relevant and providing a unique perspective that is useful or entertaining for the audience. The document stresses understanding the audience by analyzing analytics, listening on social media and creating audience personas to tailor the content.
September 25 - 12. vp 4 quiz, newspaper presentationsIECP
This document contains the agenda and notes for an IECP class. The agenda includes a VP4 quiz, two student newspaper presentations, and discussions of articles on various topics. Notes provide discussion questions for articles about Starbucks' new gun policy, Rio de Janeiro's efforts to become a smart city, economic protests in Brazil, and texting while driving habits of different age groups. The document assigns an optional newspaper summary homework and notifies students that a novel quiz will be on Friday.
Crisis Communications in a Social Media AgeJim Rettew
The document discusses crisis communication strategies and lessons from BP's response to the 2010 Gulf of Mexico oil spill. It covers developing a crisis communication plan, monitoring social media, being prepared to respond quickly, and the importance of transparency, accountability and engaging stakeholders. It notes that BP was slow to acknowledge and respond to the spill on social media, and that their initial response focused on damage control rather than addressing public concerns, a mistake others can learn from.
This document provides guidance on creating effective blog posts. It discusses:
1) The purpose of blogging is to communicate a message, engage with a community, and reach new people.
2) When writing for the web, content needs to be concise, cater to both "skimmers" and "diggers", and incorporate multimedia like images and video.
3) The steps to create a good blog post are to ask why you are writing, write a draft, re-write, integrate social media promotion, and grow an email list. Posts should be around 500 words and tell a clear story with a beginning, middle and end.
Similar to Webinar Slides-Three Knows to Great Writing Nov 4 2014 (20)
ERAU Webinar june 2019 Resumes that Work!ERAUWebinars
An Embry-Riddle Aeronautical Webinar presented on June 6, 2019. Career Guidance expert Arnold James discusses how to write a resume that will be read by recruiters and get you the job you want. The session includes do's and don'ts as well as many pointers to make your resume stand out.
ERAU Webinar May 2019 NTSB Accicent InvestigationERAUWebinars
The document provides an overview of the major investigation process conducted by the National Transportation Safety Board (NTSB) following an aviation accident. It describes the initial notification and response, evidence collection, organizing the investigative team and groups, daily investigative activities conducted on-scene and following up off-scene, and the final reporting process which results in findings, conclusions, probable cause, and safety recommendations. The Managing Director of the NTSB, Sharon Bryson, who has over 20 years of experience, presented on these various aspects of the investigative process.
ERAU Webinar April 2019 Are Drones a Threat?ERAUWebinars
Slides from an Embry-Riddle Aeronautical University webinar presented April 11, 2019 by Dr. Kristy Kiernan, Assistant Professor and Chair of the Master of Science in Unmanned Systems at Embry-Riddle Aeronautical University-Worldwide. Dr. Kiernan looks at the threat drones may post to aviation, and how those threats can be mitigated.
ERAU Webinar March 2019 Leadership Fatal FlawsERAUWebinars
Slides from a webinar presented in March 2019 by Matthew Earnhardt, assistant professor of Business at Embry-Riddle Aeronautical University. Dr. Earnhardt looks at 10 personality traits that will destroy effective leadership.
Webinar ERAU personality webinar Jan 2019ERAUWebinars
Slides from a webinar presented by Embry-Riddle Aeronautical University Adjunct Faculty member Dr. Karina Mesarosova.
This complimentary 60-minute webinar provided an overview of effective psychometric profiling and show you how you can use psychometric profiling tools, using real-world examples in pilot selection. We will explore how to read personality profiles and its best utilization in an aviation context (e.g. in the selection and in the simulator).
The webinar is instructed by Karina Mesarosova, an adjunct professor with Embry-Riddle Worldwide and a managing partner of KM Flight Research & Training, an EU-based company specializing in Human Factors. Mesarosova is an EAAP-accredited aviation psychologist as well as a member of the British Psychological Society and the European Federation of Psychologists’ Associations. She remains active within the research field to continue to improve the effectiveness of Human Factors within aviation. Her research interests include the use of personality profiling in aviation and practical approaches to assessing and managing fatigue.
Slides from an Embry-Riddle Aeronautical University webinar presented May 10, 2018 called "Preparing Effective Resumes", with Arnold James and Ryan Mazon, both with the ERAU Career Services Department.
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
Erau webinar april 2018 Aviation CybersecurityERAUWebinars
Slides from an Embry-Riddle Aeronautical University webinar presented April 12, 2018 by Dr. Remzi Seker, Professor of Cybersecurity Engineering, ERAU Daytona Beach. Dr. Seker discusses cybersecurity issues and threats protecting aircraft and the aviation industry.
ERAU webinar: Aviation English for Flight Training ERAUWebinars
This document provides information about an aviation English course for flight training offered by Embry-Riddle Aeronautical University. It discusses the growth of aviation in non-English speaking countries and how students from these countries often struggle with flight training due to a lack of English proficiency. The course is designed to teach students the English language skills needed to successfully complete flight training in 4 weeks through a focus on aviation topics. It also provides information on other English language programs offered by Embry-Riddle such as online aviation English courses and an intensive English program.
A webinar presented March 15, 2018 by Embry-Riddle Aeronautical University Worldwide. The sessions takes a look at the Bachelor of Science degree in Logistics and Supply Chain Management and the Master of Science degree in Aviation and Aerospace Sustainability, both offered by the university online. Featured presenters were Dr. Dino Koursaris and Dr. Patti Clark.
Embry-Riddle Unmanned Systems Degrees and ProgramsERAUWebinars
This document provides an agenda and overview for a webinar on Embry-Riddle Aeronautical University's degree programs related to unmanned systems. The agenda includes introductions to the Bachelor of Science in Unmanned Systems Applications degree, the Master of Science in Unmanned Systems degree, and Professional Education non-degree certificate programs in unmanned systems. Presenters will provide details on the curriculum, tracks of study, industry job placements, and opportunities for each program.
Erau webinar jan 24 2018 -pilot profilingERAUWebinars
From an Embry-Riddle Aeronautical University webinar presented January 24, 2018 by Dr. Karina Mesarosova. This webinar looks at how to use personality profiling tests to predict behavior in pilots and how it can be used for job hiring and placement.
Slides erau webinar jan 2018 pittengerERAUWebinars
This document summarizes a webinar presentation on identifying the behavioral competencies of superior performing aviation and aerospace leaders. The presentation discusses findings from a study identifying four key competencies: passion, organizational awareness, role breadth self-efficacy, and relationship building/networking. Examples of quotes from superior and average performers are provided. The significance and implications for talent management practices are then discussed, along with limitations and contributions of the research. The presentation concludes with contact information and announcements of upcoming webinars.
Erau webinar UAS-a european perspective ERAUWebinars
The document summarizes a webinar on developments in unmanned aircraft systems (UAS) from a European perspective. It includes an agenda with presentations on UAS degrees at Embry-Riddle Aeronautical University and a question/answer session. The presenter then discusses the European UAS market and regulations, cybersecurity issues, counter-UAS technologies, and the outlook for the industry. Definitions of UAS terminology are provided. Examples of commercial UAS applications are given along with the value chain and safety concerns. The presenter concludes by discussing Embry-Riddle's UAS programs and an upcoming MOOC course.
erau webinar october 2017 Commanding presentationsERAUWebinars
Slides from an Embry-Riddle Aeronautical University webinar presented Oct. 12, 2017. It features the slides from a presentation give by Captain Karen Baetzel, USN (RET) called "Commanding Presence" and discusses how to give effective oral presentations for a professional audience.
Slides from a webinar presented Sept 14 2017 by Embry-Riddle Aeronautical University-Worldwide. The webinar covered how to become a commercial pilot and featured panels from ERAU, Nashville Flight Training, AOPA, and ExpressJet.
Slides from an Embry-Riddle Aeronautical University webinar presented Aug. 24, 2017 by the Office of Professional Educations. Presenter Matt Thomas, an expert on Aerospace Coatings Application walks through issues coatings applicators face.
From an Embry-Riddle Aeronautical University webinar presented in June 2017. Covers degree information about the BS in Interdisciplanary Studies (BSIS), a newer degree offered by ERAU-Worldwide, and available completely online.
Slides from an Embry-Riddle Aeronautical University webinar presented June 22, 2017 balled "How to Create a Career Enhancement Toolkit" with presenters Sandi Ohman and Arnold James. Shows how to use portfolio to help you land that new job.
Slides erau webinar june 13 2017 international studentsERAUWebinars
Embry-Riddle Aeronautical University Webinar presented June 13, 2017. This webinar covers information for International Students seeking to study with ERAU in the US, Germany, Singapore, or Online.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
Webinar Slides-Three Knows to Great Writing Nov 4 2014
1. Thank you for joining the Embry-Riddle Aeronautical University Webinar!
“Three ‘Knows’ for Great Writing”
worldwide.erau.edu/newsroom/free-webinars.html
2. A few session pointers
• We will use the text chat for questions
• You can interact with icons
• You control the size of your screen
• Emails will be provided at the end
• A link to the recording will be emailed to you
3. Today’s Agenda
• Presentation—Dr. Terri Maue
• Question and Answers
• Overview of the Bachelor of Science in
Communication
• Upcoming Webinars
4. “Three ‘Knows’ for
Great Writing”
Dr. Terri Maue
Associate Professor
Chair, English & Humanities
5. Three ‘Knows’ for Great Writing
Webinar November 4, 2014
Dr. Terri Maue
Department Chair
English & Humanities
ERAU, Worldwide
6. Writing is all about NOs
NO No No!
No NO
NO no No
No no
NO! No no
7. NO It’s all about Knows!
• Know your message [what you want to say]
• Know your audience [who you want to say it
to]
• Know your tools [how you want to say it so it
will be received]
• Grammar, punctuation, paragraphing –
important but not the first thing to think
about!
8. Know What—Make an Outline
• See the ‘bones’ of your position
– Where is it strong?
– Where is it weak?
– Does it all ‘hang together?’
• Save yourself time and
heartbreak
9. Start with: What is your message?
• Your claim
• Your position
• Your stand
• Your belief
• What you want to persuade
the reader to seriously consider
10. What is your message?
Is this it?
• People have always driven cars since they
were invented, and cars are a big part of the
American way of life. Therefore it will be hard
for people to give up cars. However, there is
probably going to come a time when that will
happen, even though many people will
probably resist it for a long time and very
strongly. Some people just don’t like change.
11. Not your message!
Too many ideas!
• People have always driven cars since they
were invented, and cars are a big part of the
American way of life. Therefore it will be hard
for people to give up cars. However, there is
probably going to come a time when that will
happen, even though many people will
probably resist it for a long time and very
strongly. Some people just don’t like change.
12. What is your message?
Say it in just a few words:
The personal automobile
should be obsolete.
Put your message statement at
the top of your page. It’s like the
head of your skeleton—everything supports it.
13. Why would you say that?
Your reasons = because statements
The personal automobile should be
obsolete
I. Because there are cheaper, equally efficient
ways to get around.
II. Because automobiles cause environmental
damage.
III. Because it’s going to happen anyway.
14. That’s just your opinion!
• Gather some evidence
– Data
– Examples
– Research summaries
– Statistics
– Testimony
Put your evidence directly beneath each reason.
15. Now your outline looks like this:
The personal automobile should be obsolete.
I. Because there are cheaper, equally efficient ways to get around.
1) 20% rise in ownership costs over last 3 years
2) Average family income in same period rose 13%
3) Survey data: 45% say mass transportation has improved in efficiency and
convenience over last ten years; 68% say they use mass transportation
II. Because automobiles cause environmental damage.
1) Global warming is caused in part by auto emissions
2) Readers’ Digest survey shows 43% of Americans are concerned about
damage to the environment caused by cars and trucks.
3) Sierra Club website: “Automobile manufacture and support (roads, fuel,
dumps, etc.) are destroying natural resources almost as fast as logging and burning in
the rainforest.”
Please note: I made all this up.
16. What if it looked like this?
The personal automobile should be obsolete.
I. Because there are cheaper, equally efficient ways to get around.
1) 20% rise in ownership costs over last 3 years
2) Average family income in same period rose 13%
3) Survey data: 45% say mass transportation has improved in
efficiency and convenience over last ten years; 68% say they use mass
transportation
II. Because automobiles cause environmental damage.
1) Global warming is caused in part by auto emissions
This reason is not well supported, is it?
You need more evidence!
Please note: I made all this up.
17. Know What: Your Message
• Be able to state your message in one simple
sentence.
• Be able to explain clearly and logically why
you believe what you say.
• Be able to support your views with credible
and sufficient evidence.
• Do all this before you begin to write!
18. Know Who: Your Audience
Are you preaching to the choir?
Or do some people disagree?
It’s not always obvious!
19. Hidden pitfalls to persuasion
Unstated assumptions:
– Value judgments
– Deeply held beliefs
– Very simple but very powerful
• something is good or bad, desirable or undesirable,
constructive or destructive
20. Unstated Assumptions
The personal automobile should be obsolete.
I. Because there are cheaper, equally efficient
ways to get around. (UA: Saving money is
good; efficiency is good.)
II. Because automobiles cause environmental
damage. (UA: Damage to the environment is
undesirable.)
21. What happens when values and beliefs
are not shared?
The personal automobile should be obsolete.
I. Because there are cheaper, equally efficient
ways to get around. (UA: Saving money is
good; efficiency is good.)
To some, a car is more
than just a way to get
around. It’s status, a
statement of identity,
independence.
22. Who would object?
Will people object to: your message?
your reasons?
your values?
your evidence?
Put the objection where it fits into your outline.
Figure out how to counteract it.
23. Now your outline looks like this:
The personal automobile should be obsolete.
I. Because there are cheaper, equally efficient ways to get around. [objection: some
people buy cars for status, identity, independence; counter: data or testimony that
saving money confers status; desirable to be identified as frugal and efficient?]
1) 20% rise over last 3 years
2) Average family income in same period rose 13%
3) Survey data: 45% say mass transportation has improved in efficiency and
convenience over last ten years; 68% say they use mass transportation
II. Because automobiles cause environmental damage. [objection: technology will save
us; counter: data showing we can’t wait?]
1) Global warming is caused in part by auto emissions
2) Readers’ Digest survey shows 43% of Americans are concerned about
damage to the environment caused by cars and trucks.
3) Sierra Club website: “Automobile manufacture and support (roads, fuel,
dumps, etc.) are destroying natural resources almost as fast as logging and burning in
the rainforest.”
Please note: I made all this up.
24. Know Who: Your Audience
• Be able to identify what your audience
values.
• Be able to identify any opposing opinions they
might hold.
• Be able to weaken any opposition.
25. Know How: Your Tools
• You have the info—how to present it?
– Your message must be understood
– Your message must be seriously considered
• Your tool box—rhetorical strategies
26. You already do it: Rhetorical Strategies
Example: Over the weekend, you went to a wild,
all-night, blowout party at a friend’s house.
• How do you describe it to your buddie who
wasn’t there?
• How do you describe it to your grandmother?
• Rhetorical strategies! [details, word
choices, images]
27. You already do it: Rhetorical Strategies
Example: You want to ask your boss for a day off.
A. Dude, not comin’ in on Friday, cool?
B. Mr. Harris, I’d like to take my grandmother to
the doctor on Friday. Could I have the day
off?
• Rhetorical Strategies! [details, word
choices, order of presentation]
28. You already do it: Rhetorical Strategies
Word choices create different effects.
• The elegantly dressed woman began to
____________ a tiny sandwich.
Chew, eat, chow down, devour, feast upon,
masticate, polish off, nibble
• He put the _____________ in the window.
Blade, flabellum, propeller, thermantidote,
fan, windmill
29. Know How: Your Tools
• Be able to identify your audience’s comfort
level with details and images [values]
• Be able to identify your audience’s need for
details and order of presentation
• Be able to choose appropriate words to
accurately convey your message
Who and How go together!
30. Three Knows for Great Writing
• Know your message
[what you want to say]
• Know your audience
[who you want to say it to]
• Know your tools
[how you want to say it so it will be received]
31. And finally, a word about …
…Punctuation
It actually is important ….
32. Let’s eat Grandma!!!
Let’s eat, Grandma!!!
Punctuation saves lives!
And it makes your writing easier to understand
33.
34.
35. Bachelor of Science in Communication
Online
• For technical and science-minded students
• Join today’s communicators working across
multiple, media-rich channels
– Corporate communications
– Journalism
– Online content development
– Science and technical reporting
– Social media
36. Bachelor of Science in Communication
Courses
• Science and Technology Communication
• Digital Photography
• Mass Communication Law and Ethics
• Technology and Modern Civilization
• Visual Design
• Applied Cross Cultural Communication
• Aviation and Aerospace Communication
• Communication and Organizational Culture
37. Bachelor of Science in Communication
Your career is waiting!
• The U.S. Bureau of Labor Statistics estimates a
faster-than-average 15 percent growth rate in
technical writing jobs through 2022.
• Every business has a need for expert
communicators to share information with
internal and external audiences.
Go to WORLDWIDE.ERAU.EDU and get started!
38. Upcoming Webinars:
• Nov. 18 Understanding the Global Business
Environment (China Trip)
• Jan. 13 The B.S. in Aeronautics Degree and
its Capstone
• Feb. 10 Aviation Psychology
Additional webinars are scheduled through June.
39. For questions about today’s presentation:
Dr. Terri Maue
maue890@erau.edu
For questions about the webinar series:
Bill Gibbs, Webinar Series Coordinator
bill.gibbs@erau.edu