On Responding - People's Insights for October 2014MSL
In this issue of the People’s Insights monthly briefs, we look at different ways brands, corporate communicators and public figures have chosen to respond to criticism on social media. The forms of criticism vary from stray comments, detailed blog posts, and op-eds in the New York Times to angry voices on social media.
Here’s an overview of the examples featured in this report:
• Responding to… Maintain Decorum
• Responding to… End Speculation
• Responding to… Correct Inaccuracies
• Responding to… Change Perceptions
• Bonus: Responding to… Set the Tone
We’d love to hear your take on these approaches. Do share your thoughts with us at @PeoplesLab on Twitter. You can also reach out to us on Twitter @msl_group.
Tommy Chong's Politically Wild Twitter Rants are Now LegendCannabis News
Tommy Chong is not shy on Twitter and not shy about his dislike of Trump, and anyone who likes him, read this https://cannabis.net/blog/opinion/tommy-chongs-politically-wild-twitter-account-is-he-really-writing-this-stuff
I never gave up engagement with playable characters and esports players of ov...Tanja Välisalo
Conference presentation on Overwatch esports audiences based on survey data. Paper available at: Paper online at
https://doi.org/10.1145/3337722.3337769
On Responding - People's Insights for October 2014MSL
In this issue of the People’s Insights monthly briefs, we look at different ways brands, corporate communicators and public figures have chosen to respond to criticism on social media. The forms of criticism vary from stray comments, detailed blog posts, and op-eds in the New York Times to angry voices on social media.
Here’s an overview of the examples featured in this report:
• Responding to… Maintain Decorum
• Responding to… End Speculation
• Responding to… Correct Inaccuracies
• Responding to… Change Perceptions
• Bonus: Responding to… Set the Tone
We’d love to hear your take on these approaches. Do share your thoughts with us at @PeoplesLab on Twitter. You can also reach out to us on Twitter @msl_group.
Tommy Chong's Politically Wild Twitter Rants are Now LegendCannabis News
Tommy Chong is not shy on Twitter and not shy about his dislike of Trump, and anyone who likes him, read this https://cannabis.net/blog/opinion/tommy-chongs-politically-wild-twitter-account-is-he-really-writing-this-stuff
I never gave up engagement with playable characters and esports players of ov...Tanja Välisalo
Conference presentation on Overwatch esports audiences based on survey data. Paper available at: Paper online at
https://doi.org/10.1145/3337722.3337769
Study by Ph.D. Student Christopher Sibona on why people unfriend on Facebook. Presentation on his study at the Emerging Media Conference in Januray 2011. Download the presentation and/or watch videos from this and other presentations from EmMeCon at http://wappow.com/resources/videos
How 2020 Changed the Job Search LandscapeFairygodboss
Fairygodboss surveyed 1,000 men and women to learn more about how they look for and evaluate potential employers and job opportunities. While men and women share some similarities when it comes to compensation, their priorities differ when it comes to additional benefits and social issues. Women are more likely to care about an employer's stance on gender and racial equality, so we surveyed an additional 500 women to learn more about how they believe media and corporate attention will, or will not, affect racial inequalities in the workplace. Read the full report to learn more.
Study by Ph.D. Student Christopher Sibona on why people unfriend on Facebook. Presentation on his study at the Emerging Media Conference in Januray 2011. Download the presentation and/or watch videos from this and other presentations from EmMeCon at http://wappow.com/resources/videos
How 2020 Changed the Job Search LandscapeFairygodboss
Fairygodboss surveyed 1,000 men and women to learn more about how they look for and evaluate potential employers and job opportunities. While men and women share some similarities when it comes to compensation, their priorities differ when it comes to additional benefits and social issues. Women are more likely to care about an employer's stance on gender and racial equality, so we surveyed an additional 500 women to learn more about how they believe media and corporate attention will, or will not, affect racial inequalities in the workplace. Read the full report to learn more.
2009 MSU Fall Extension Conference Social Media Presentationnatalieebigscott
Presented by Natalie Ebig Scott, Laura Probyn, Michelle Lavra and Beth Stuever on October 14, 2009 for MSU Extension staff members interested in getting engaged in social media.
Christopher Sibona Ph.D. is the Principal Software Engineer at Oracle Corp. Christopher obtained his Ph.D. at the University of Colorado Business School in 2011. His study on why people unfriend on Facebook has helped hundreds of corporations and individuals understand what encourages engagement and what turns people off when marketing on Facebook. This is Christopher’s talk at the January 2011 Emerging Media Conference in San Francisco, CA.
A presentation on the relationship between social networking sites and friendships based on a chapter from the book, "Hanging Out, Messing Around, and Geeking Out,"
Facebook is one of the most popular sites on the Internet and people are posting everything from baby pictures to their uttermost thoughts. Unfortunately, the privacy settings on the popular networking site are confusing. Often people are sharing what they think is private. Learn how the Facebook privacy settings work and how to explain them to users.
Using Facebook to Be More Self-Determined covers everything people with disabilities need to know so they can use Facebook to be more self-determined! Joshua Ryf and Jennifer Kuhr explain what Facebook has to offer and show you how to take advantage of all of its features. They also discuss do’s and don’t’s, as well as how to respect yourself and others, and how to stay safe. Then, they go over strategies that will help you build your own social network and engage others to raise awareness about self-determination. Whether you use Facebook a little, a lot, or not at all, this session is for you!
The role of Social Media in college admission processSumit Gupta
Recently I was invited by Himanshu Dev, Head, Middle East, Admissions Consulting Services, The Princeton Review to deliver a presentation on how Social Media nowadays plays an important roles in college admission process and how it can also help students portray their true self which goes beyond State of Purpose essays!
Share will be highly appreciated :)
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Zeynep asa 2011 privacy
1. A Proactive Generation Reacts: Privacy, Disclosure and Strategic Action on Facebook By Zeynep Tufekci Assistant Professor University of North Carolina, Chapel Hill Twitter: @techsoc [email_address] n c.edu
9. Sample Characteristics 3.58 Years on FB MEAN 4.06 General Privacy Concern (1-5) MEAN 26.5 Asian-Ame. 13.0 Hisp./Other 17.5 Black 43.0 White 45.6 Female 53.3 Male N (%)
10. Sample Descriptives 3.3 How concerned are you that people you do not want to see your profile would see your profile (1-5) 1.8 To find potential friends 1.5 To find people with similar interests 3.4 Keep in touch with friends elsewhere 3.1 Keep in touch with friends in same school EVER USE FACEBOOK FOR: (1-4)
11. 90.3 Those whose last change was to make their profile LESS visible Of those who changed ever privacy settings (n=363): 82.9 Changed their privacy settings in the last year 36.7 Changed their privacy settings last month 9.4 Never changed privacy settings % Those who have: 19.6 Deactivate their profile 68.3 Unfriend someone 81.3 Deleted info from profile 73.9 Untagged themselves from a photo % EVER DONE THE FOLLOWING BECAUSE OF A PRIVACY OR VISIBILITY CONCERN?
12. Sample Descriptives 0.8% Had a legal problem 17.2% Had a fight with a parent 25.7% Had a fight with a friend 8.0% Broke up with a girlfriend/boyfriend 28.7% Had a fight with a girlfriend/boyfriend 2.5% Had issues at work 0.5% Did not get hired 0.8% Lost a job AT LEAST ONCE Did the Following Happen to YOU?
13. 21.9% Had a legal problem 53.2% Had a fight with a parent 66.2% Had a fight with a friend 51.2% Broke up with a girlfriend/boyfriend 70.9% Had a fight with a girlfriend/boyfriend 30.8% Had issues at work 19.4% Did not get hired 19.7% Lost a job AT LEAST ONCE Did the Following Happen to SOMEONE YOU KNOW?
14. 32.5% You got caught in a lie by someone else through your profile 59.6% You found that someone else had been lying to you by looking at their profile 77.8% You found out something very important about a friend 54.6% Someone much older contacted you 33.6% Someone harassed/stalked you online 39.8% You got upset with someone after seeing a picture of theirs with someone else 25.7% Someone else got upset with you seeing a picture of you with someone else 70.0% Other people posted pictures of you that you wish they had not 73.9% Someone you did not want found your profile AT LEAST ONCE Did Any of the Following Happen to You? (%)
17. exp(b) exp(b) exp(b) exp(b) Female 1.583 1.732* 0.611 0.255** Black 1.032 0.684 0.428 1.232 Hisp/Other 0.693 0.929 1.828 1.192 Asian 0.676 0.934 0.680 1.861 Happened to me 0.988 0.980 1.044 1.016 I observed 1.099 1.023 1.079 1.085 Surveillance 1.049 1.004 0.754*** 0.937 Far friends 1.181 1.165 0.824 0.925 Near friends 0.892 1.538* 1.186 0.907 Find potential 1.002 1.283 0.740 1.031 Find similar 0.679 0.761 1.801* 1.337 Audience Concern 1.671*** 1.791*** 0.624* 0.375*** Years on FB 1.364** 1.047 0.803 0.773* _cons 0.097 0.008*** 22.286 8.462 N 383 383 383 383 ll -162.272 223.213 -97.021 -104.967 * * p<0.05, ** p<0.01, *** p<0.001 Logistic Regression Modeling Odds of Privacy Related Behaviors Less Visible Last Month Never Changed Public Profile
18.
19. Know Don’t Know exp(b) exp(b) Female -0.098 -0.141 Black 0.100 0.129 Hisp/Other 0.209 -0.021 Asian 0.243** 0.145 Someone else -0.007 -0.003 Me 0.015 -0.032 Surveillance 0.010 0.036*** Far friends -0.023 0.104 Near friends 0.017 -0.026 Find potential 0.039 0.156** Find similar 0.029 0.138* Profile concern -0.033 - 0.164*** Years on FB 0.005 -0.015 _cons 3.219*** 1.494*** N 381 381 ll -365.679 -420.871 * p<0.05, ** p<0.01, *** p<0.001 Logistic Regression Modeling Odds of Accepting Friend Request from Person already known / not known
20.
21. Nickname exp(b) Female 0.527 Black 2.810* Hisp/Other 0.951 Asian 1.194 Someone else 0.929 Me 1.081 Surveillance 1.021 Far friends 0.920 Near friends 1.020 Find potential 1.386 Find similar 0.798 Profile concern 1.196 Years on FB 1.101 _cons 0.031* N 383 ll -103.802 * p<0.05, ** p<0.01, *** p<0.001 Logistic Regression Modeling Odds of Using a Nickname of Facebook