Enviar búsqueda
Cargar
Social Search Concept In Jaanix1
•
Descargar como PPT, PDF
•
1 recomendación
•
214 vistas
O
olgasmys
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 37
Descargar ahora
Recomendados
Presentation about the use of social technology for scientific research institutions. Delivered October 2011 at the Annual Meeting of the Association of Independent Research Institutes (AIRI).
Maximizing the Use of Social Media and Technology at AIRI Institutes
Maximizing the Use of Social Media and Technology at AIRI Institutes
Sanky Inc.
Social Media And The Church
Social Media And The Church
blacknarcissus
Bernie Hogan, "A survey of Facebook as a research site"
Bernie Hogan, "A survey of Facebook as a research site"
summersocialwebshop
How can scientists use social media to enhance their online profile? Becoming pro-active and increasing your visibility is essential for your career development. Social media is a very useful tool to help you to get your name out there and to extend your professional network. This is a talk which I gave on 2nd July in the "Advanced Communications" session at the SEB (Society for Experimental Biology) Annual Meeting, Salzburg 2012. More information: http://www.sebiology.org/meetings/Salzburg2012/education.html
Enhancing your online presence with social media
Enhancing your online presence with social media
Anne Osterrieder
Global networking
Global networking
Global networking
iubat
A revision of the talk I did in Colombia in '08, slides 53-59 are really the new part where I try to introduce the need for additional practices to counterbalance the tendency of the network to focus on the perennial "now"
Becoming a network learner - Tlt '10
Becoming a network learner - Tlt '10
Scott Leslie
NSPRA 2009 -- Using Web 2.0 and Social Media to Reach Your Audience
NSPRA 2009 -- Using Web 2.0 and Social Media to Reach Your Audience
Evelyn McCormack
Presentation at Columbia University, Jan. 22, 2010.
Using Web 2.0 to Communicate with the Public
Using Web 2.0 to Communicate with the Public
Evelyn McCormack
Recomendados
Presentation about the use of social technology for scientific research institutions. Delivered October 2011 at the Annual Meeting of the Association of Independent Research Institutes (AIRI).
Maximizing the Use of Social Media and Technology at AIRI Institutes
Maximizing the Use of Social Media and Technology at AIRI Institutes
Sanky Inc.
Social Media And The Church
Social Media And The Church
blacknarcissus
Bernie Hogan, "A survey of Facebook as a research site"
Bernie Hogan, "A survey of Facebook as a research site"
summersocialwebshop
How can scientists use social media to enhance their online profile? Becoming pro-active and increasing your visibility is essential for your career development. Social media is a very useful tool to help you to get your name out there and to extend your professional network. This is a talk which I gave on 2nd July in the "Advanced Communications" session at the SEB (Society for Experimental Biology) Annual Meeting, Salzburg 2012. More information: http://www.sebiology.org/meetings/Salzburg2012/education.html
Enhancing your online presence with social media
Enhancing your online presence with social media
Anne Osterrieder
Global networking
Global networking
Global networking
iubat
A revision of the talk I did in Colombia in '08, slides 53-59 are really the new part where I try to introduce the need for additional practices to counterbalance the tendency of the network to focus on the perennial "now"
Becoming a network learner - Tlt '10
Becoming a network learner - Tlt '10
Scott Leslie
NSPRA 2009 -- Using Web 2.0 and Social Media to Reach Your Audience
NSPRA 2009 -- Using Web 2.0 and Social Media to Reach Your Audience
Evelyn McCormack
Presentation at Columbia University, Jan. 22, 2010.
Using Web 2.0 to Communicate with the Public
Using Web 2.0 to Communicate with the Public
Evelyn McCormack
A presentation given at the COU Symposium of Ontario Research Chairs in Public Policy held on March 5, 2012.
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
KMb Unit, York University
HHH PDP
Blogging/RSS in Education
Blogging/RSS in Education
E Robertson
Workshop conducted at the Lower Hudson Regional Information Center, Nov. 18, 2009
Web 2 0 And The Building Principal
Web 2 0 And The Building Principal
Evelyn McCormack
9 reasons why you should have a blog (in addition to or instead of Facebook or Twitter) Presented by Mike Roe from AgencyND at a February 16, 2011 brown bag session.
Blogging: B!@g is not a four-letter word.
Blogging: B!@g is not a four-letter word.
agencynd
In this talk, I provide very pragmatic reasons for scientists—particularly early-career ones—to consider joining the social media bandwagon. I also provide a few examples of effective uses of social media.
Social Media For Researchers -- A personal account
Social Media For Researchers -- A personal account
cdessimoz
Presentation as part of a Year 2 undergraduate module on Online Journalism. Part of the degree in Journalism at Birmingham City University's School of Media.
Online Journalism: Wikis
Online Journalism: Wikis
Paul Bradshaw
In our digital world, if you use the web, you have an online presence. And academics are no exception. Universities have webpages profiling their staff. Academic networks, like LinkedIn, Academia.edu and more, are used by researchers around the globe to keep in contact with colleagues and collaborators. And social media are everywhere you turn. As an academic, you want your research outputs to be found and read. Making a difference and having an influence is almost a job requirement. Nowadays, the expectation is that you can be found online. So, what can you do to be aware of how you appear online? And, what can you do to increase your visibility? This presentation was part of a session for academics wanting to find out how they can review their existing digital footprints and shadows, make decisions about what kind of online presence they would like and plan how they can achieve it. Several different possible ways of increasing their visibility as well as the visibility of their research and their outputs are discussed.
Academics' online presence: Assessing and shaping your online visibility_26oc...
Academics' online presence: Assessing and shaping your online visibility_26oc...
SarahG_SS
Social media workshop for Duke faculty, 2013
Social media workshop for Duke faculty, 2013
Cara Rousseau
Guido Appenzeller CEO Big Switch Networks ONS2015: http://bit.ly/ons2015sd ONS Inspire! Webinars: http://bit.ly/oiw-sd Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Opening Up Your Network with SDN
Opening Up Your Network with SDN
Open Networking Summits
My Social Media Accounts
My Social Media Accounts
Eric Herberholz
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
Colorado Internet Society (CO ISOC)
Rakuten Technology Conference 2014 "OpenStack - the ubiquitous Open Source cloud platform" Tom Fifield (OpenStack Community Manager)
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
Rakuten Group, Inc.
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
Melissa Lim
RSA 2016 teaser
Rsa2016
Rsa2016
F _
Cyber Intelligence Hatékony védelem az ismeretlen ellen - Vezetői áttekintés A Darktrace kiberintelligencia rendszere megteremti az ismeretlen, még felfedezetlen támadások elleni védelem lehetőségét. A rendszer gépi tanulás útján a támadásokkal járó elkerülhetetlen rendellenességek felfedezését biztosítja: amikor egy sikeres külső vagy belső támadás megváltoztat egy normál viselkedésmintát, ezt a Darktrace rögtön azonosítja. A hatékony kiberintelligencia segítségével a külső támadók és a belsős segítők több hónapos észrevétlen káros tevékenysége percek alatt azonosítható, még mielőtt érdemi kárt okozhatnának a megtámadott hálózatban. Nincs áthatolhatatlan védelem Száz százalékos kibervédelmet megvalósítani a mai komplex IT környezetben gyakorlatilag kivitelezhetetlen, ebben évek óta egyetért az IT biztonsági szakma. Már régóta az sem kérdés, hogy egy adott védelem áthatolható-e egyáltalán, csak az, hogy mennyi idő alatt, illetve hogy tudomást szerzünk-e a sikeres támadásról. Míg a tűzfalak, a vírusvédelmi rendszerek, a sebezhetőségmenedzsment vagy épp egy fejlett végpontvédelem alapvető fontosságú a többrétegű biztonsági rendszer szemléletében, egyetlen gyártó sem vállal garanciát áthatolhatatlan védelemre. A valódi kérdést inkább az jelenti, hogyan készülhetünk fel az összes védelmi rendszeren sikeresen átjutó támadásra, és hogyan hatástalaníthatjuk időben, minimalizáljuk az okozott kárt. „A hálózati ökoszisztéma sebezhetőségeire és fenyegetéseire való folyamatos betekintés segít felkészülni és tervezni olyan kockázatok kezelésére, amelyek a kevésbé tájékozottaknak fel sem tűnhet.” PWC A reakcióra és szignatúrákra alapuló védelmi rendszerek évtizedek óta támadási adatbázis frissítéseken keresztül megbízhatóan védenek a máshol már azonosított kártevők és támadásminták ellen. Viszont szükséges velejárójuk, hogy célzott, egyedi és korábban sehol nem látott támadásokat egyáltalán nem tudnak kezelni. Ráadásul a támadások nem mindig járnak azonosítható kártevőkkel vagy támadásmintákkal; gondoljunk például egy ellopott jelszóra, vagy egy korrupt belsős segítőre. A helyes jelszót minden behatolásvédelmi rendszer átengedi, míg a belső, megfelelő jogosultságok tulajdonában történő szándékos károkozás teljes mértékben a védelmi rendszerek engedélye mellett történhet. Adatvédelem vagy rugalmasság? A modern vállalatok és közintézmények lételeme az adat, amely összekötött, egyre komplexebb hálózatokon keresztül utazik különféle szolgáltatások, felhők és adatbázisok között. A felhasználók, beszállítók és ügyfelek között folyamatosan mozgó adatok átfogó védelme minden IT biztonsági felelős alapvető kihívása. Üzleti adatai mellett számos vállalat legfontosabb erőforrását az alkalmazottai adják, viszont a legnagyobb veszélyt is ők jelentik a kezelt adatokra: egy önállóan végzett csalássorozat vagy külső segítőkkel való együttműködés beláthatatlan kárt okozhat.
Darktrace kiberintelligencia
Darktrace kiberintelligencia
Balázs Antók
Overview in Knowledge Management
Knowledge management
Knowledge management
Max Bal
HoneyCon 2016
如何用 Docker 快速建立 honeypot public
如何用 Docker 快速建立 honeypot public
Tim Hsu
We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process.
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
Antigena Overview
Antigena Overview
Austin Eppstein
ICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
Austin Eppstein
2016 IBM Beacon award winners. These awards are for IBM business partners that have delivered exceptional value to their customers.
2016 IBM Beacon award winners
2016 IBM Beacon award winners
Chris Sparshott
.
Cs chantecler
Cs chantecler
Claudio Nasti ✔
Más contenido relacionado
La actualidad más candente
A presentation given at the COU Symposium of Ontario Research Chairs in Public Policy held on March 5, 2012.
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
KMb Unit, York University
HHH PDP
Blogging/RSS in Education
Blogging/RSS in Education
E Robertson
Workshop conducted at the Lower Hudson Regional Information Center, Nov. 18, 2009
Web 2 0 And The Building Principal
Web 2 0 And The Building Principal
Evelyn McCormack
9 reasons why you should have a blog (in addition to or instead of Facebook or Twitter) Presented by Mike Roe from AgencyND at a February 16, 2011 brown bag session.
Blogging: B!@g is not a four-letter word.
Blogging: B!@g is not a four-letter word.
agencynd
In this talk, I provide very pragmatic reasons for scientists—particularly early-career ones—to consider joining the social media bandwagon. I also provide a few examples of effective uses of social media.
Social Media For Researchers -- A personal account
Social Media For Researchers -- A personal account
cdessimoz
Presentation as part of a Year 2 undergraduate module on Online Journalism. Part of the degree in Journalism at Birmingham City University's School of Media.
Online Journalism: Wikis
Online Journalism: Wikis
Paul Bradshaw
In our digital world, if you use the web, you have an online presence. And academics are no exception. Universities have webpages profiling their staff. Academic networks, like LinkedIn, Academia.edu and more, are used by researchers around the globe to keep in contact with colleagues and collaborators. And social media are everywhere you turn. As an academic, you want your research outputs to be found and read. Making a difference and having an influence is almost a job requirement. Nowadays, the expectation is that you can be found online. So, what can you do to be aware of how you appear online? And, what can you do to increase your visibility? This presentation was part of a session for academics wanting to find out how they can review their existing digital footprints and shadows, make decisions about what kind of online presence they would like and plan how they can achieve it. Several different possible ways of increasing their visibility as well as the visibility of their research and their outputs are discussed.
Academics' online presence: Assessing and shaping your online visibility_26oc...
Academics' online presence: Assessing and shaping your online visibility_26oc...
SarahG_SS
Social media workshop for Duke faculty, 2013
Social media workshop for Duke faculty, 2013
Cara Rousseau
La actualidad más candente
(8)
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
Using Social Media to Disseminate Research - COU Symposium - March 5, 2012
Blogging/RSS in Education
Blogging/RSS in Education
Web 2 0 And The Building Principal
Web 2 0 And The Building Principal
Blogging: B!@g is not a four-letter word.
Blogging: B!@g is not a four-letter word.
Social Media For Researchers -- A personal account
Social Media For Researchers -- A personal account
Online Journalism: Wikis
Online Journalism: Wikis
Academics' online presence: Assessing and shaping your online visibility_26oc...
Academics' online presence: Assessing and shaping your online visibility_26oc...
Social media workshop for Duke faculty, 2013
Social media workshop for Duke faculty, 2013
Destacado
Guido Appenzeller CEO Big Switch Networks ONS2015: http://bit.ly/ons2015sd ONS Inspire! Webinars: http://bit.ly/oiw-sd Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Opening Up Your Network with SDN
Opening Up Your Network with SDN
Open Networking Summits
My Social Media Accounts
My Social Media Accounts
Eric Herberholz
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
Colorado Internet Society (CO ISOC)
Rakuten Technology Conference 2014 "OpenStack - the ubiquitous Open Source cloud platform" Tom Fifield (OpenStack Community Manager)
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
Rakuten Group, Inc.
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
Melissa Lim
RSA 2016 teaser
Rsa2016
Rsa2016
F _
Cyber Intelligence Hatékony védelem az ismeretlen ellen - Vezetői áttekintés A Darktrace kiberintelligencia rendszere megteremti az ismeretlen, még felfedezetlen támadások elleni védelem lehetőségét. A rendszer gépi tanulás útján a támadásokkal járó elkerülhetetlen rendellenességek felfedezését biztosítja: amikor egy sikeres külső vagy belső támadás megváltoztat egy normál viselkedésmintát, ezt a Darktrace rögtön azonosítja. A hatékony kiberintelligencia segítségével a külső támadók és a belsős segítők több hónapos észrevétlen káros tevékenysége percek alatt azonosítható, még mielőtt érdemi kárt okozhatnának a megtámadott hálózatban. Nincs áthatolhatatlan védelem Száz százalékos kibervédelmet megvalósítani a mai komplex IT környezetben gyakorlatilag kivitelezhetetlen, ebben évek óta egyetért az IT biztonsági szakma. Már régóta az sem kérdés, hogy egy adott védelem áthatolható-e egyáltalán, csak az, hogy mennyi idő alatt, illetve hogy tudomást szerzünk-e a sikeres támadásról. Míg a tűzfalak, a vírusvédelmi rendszerek, a sebezhetőségmenedzsment vagy épp egy fejlett végpontvédelem alapvető fontosságú a többrétegű biztonsági rendszer szemléletében, egyetlen gyártó sem vállal garanciát áthatolhatatlan védelemre. A valódi kérdést inkább az jelenti, hogyan készülhetünk fel az összes védelmi rendszeren sikeresen átjutó támadásra, és hogyan hatástalaníthatjuk időben, minimalizáljuk az okozott kárt. „A hálózati ökoszisztéma sebezhetőségeire és fenyegetéseire való folyamatos betekintés segít felkészülni és tervezni olyan kockázatok kezelésére, amelyek a kevésbé tájékozottaknak fel sem tűnhet.” PWC A reakcióra és szignatúrákra alapuló védelmi rendszerek évtizedek óta támadási adatbázis frissítéseken keresztül megbízhatóan védenek a máshol már azonosított kártevők és támadásminták ellen. Viszont szükséges velejárójuk, hogy célzott, egyedi és korábban sehol nem látott támadásokat egyáltalán nem tudnak kezelni. Ráadásul a támadások nem mindig járnak azonosítható kártevőkkel vagy támadásmintákkal; gondoljunk például egy ellopott jelszóra, vagy egy korrupt belsős segítőre. A helyes jelszót minden behatolásvédelmi rendszer átengedi, míg a belső, megfelelő jogosultságok tulajdonában történő szándékos károkozás teljes mértékben a védelmi rendszerek engedélye mellett történhet. Adatvédelem vagy rugalmasság? A modern vállalatok és közintézmények lételeme az adat, amely összekötött, egyre komplexebb hálózatokon keresztül utazik különféle szolgáltatások, felhők és adatbázisok között. A felhasználók, beszállítók és ügyfelek között folyamatosan mozgó adatok átfogó védelme minden IT biztonsági felelős alapvető kihívása. Üzleti adatai mellett számos vállalat legfontosabb erőforrását az alkalmazottai adják, viszont a legnagyobb veszélyt is ők jelentik a kezelt adatokra: egy önállóan végzett csalássorozat vagy külső segítőkkel való együttműködés beláthatatlan kárt okozhat.
Darktrace kiberintelligencia
Darktrace kiberintelligencia
Balázs Antók
Overview in Knowledge Management
Knowledge management
Knowledge management
Max Bal
HoneyCon 2016
如何用 Docker 快速建立 honeypot public
如何用 Docker 快速建立 honeypot public
Tim Hsu
We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process.
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
Antigena Overview
Antigena Overview
Austin Eppstein
ICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
Austin Eppstein
2016 IBM Beacon award winners. These awards are for IBM business partners that have delivered exceptional value to their customers.
2016 IBM Beacon award winners
2016 IBM Beacon award winners
Chris Sparshott
.
Cs chantecler
Cs chantecler
Claudio Nasti ✔
Getting ahead of compromise
Getting ahead of compromise
Getting ahead of compromise
CMR WORLD TECH
Destacado
(15)
Opening Up Your Network with SDN
Opening Up Your Network with SDN
My Social Media Accounts
My Social Media Accounts
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
[RakutenTechConf2014] [A-1] OpenStack - the ubiquitous Open Source cloud plat...
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
Rsa2016
Rsa2016
Darktrace kiberintelligencia
Darktrace kiberintelligencia
Knowledge management
Knowledge management
如何用 Docker 快速建立 honeypot public
如何用 Docker 快速建立 honeypot public
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
Antigena Overview
Antigena Overview
ICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
2016 IBM Beacon award winners
2016 IBM Beacon award winners
Cs chantecler
Cs chantecler
Getting ahead of compromise
Getting ahead of compromise
Similar a Social Search Concept In Jaanix1
Jaanix Revisited
Jaanix Revisited
olgasmys
Nctc social media 2011
Nctc social media 2011
NCTC
Finally, the straight dope on social media! Blogging can help legal professionals position themselves build a web presence, protect their reputations, and build business. Social media tools like Twitter and LinkedIn can also help you grow your practice, but how much really, and how much time should you spend on them? Hosted by our friends at Fastcase®, Smarter Legal Research. Find out more at http://www.fastcase.com. For more Rocket Matter insight and commentary, please check out http://www.legalproductivity.com
How to Use Blogs, Twitter & LinkedIn for Legal Professionals
How to Use Blogs, Twitter & LinkedIn for Legal Professionals
Rocket Matter, LLC
A 2010 presentation for local units of teacher organizations that want to learn how to use social media.
Introduction to Social Media
Introduction to Social Media
Sharon Terrell Consultancy
a project about online piracy, sharing and it's future
Online Piracy Project
Online Piracy Project
Academy of Art University
Kellie Parker, leader of a four-person community team for SEGA of America, gives the inside scoop on setting up a B2B social community and discusses best practices. Included: choosing which tools you’ll need, understanding how to leverage reader-generated content and how much editorial involvement is needed for different types of social sites.
Leveraging the Power of B2B Social Communities
Leveraging the Power of B2B Social Communities
asbpe
Web 2.0 presentation for ECLS, Coralville, IA Nov 2008
Ecls Social Web Nov 2008
Ecls Social Web Nov 2008
Louise Alcorn
Time Magazine's person of the year for 2006 was "you". Just why are "you" so important? It's all because of the phenomenon known as The Social Web. This presentation will introduce you to just what the Social Web is, it's impact, and many of the ways that librarians can participate.
The Social Web
The Social Web
Nebraska Library Commission
A basic introduction to social networking sites, including Facebook, Twitter, MySpace, and Facebook. This presentation was delivered to Coos County Library District staff at the Coos Bay Public Library in December 2009.
Social Networking (CBPL)
Social Networking (CBPL)
North Bend Public Library
Social media for councils june 10
Social media for councils june 10
Nathalie McDermott
In the summer of 2009 the American Association of School Librarians honored 25 websites as the best for teaching and learning. These 25 websites foster the qualities of innovation, creativity, active participation, and collaboration. They are free, web-based sites that are user friendly and encourage a community of learners to explore and discover. Websites from this list that would be useful in a public library setting will be previewed at the March 2nd First Tuesday’s continuing education free webinar at 9 a.m.
8 Teaching and Learning Websites Mentioned by AASL
8 Teaching and Learning Websites Mentioned by AASL
Ahniwa Ferrari
Social Media – Lotteries Council 2011
Social Media – Lotteries Council 2011
Sue Fidler Ltd
The presentation was made in Toronto Canada, on November 8, 2011 by Cher Jones at the Local Immigration Partnership South Scarborough Information Fair and Community Summit. The event was described as a participatory, community and strength-based approach to better serving newcomers to Canada.
Using Social Media Effectively -SociallyActive
Using Social Media Effectively -SociallyActive
Cher Jones
Issues, examples and advice for students wanting to use social media for their research. Please also see the online library guide at http://libguides.ncl.ac.uk/socialmedia
Social media for academic and career development
Social media for academic and career development
Newcastle University Library
Week 6 slides from the class "Social Web 2.0" I taught at the University of Washington's Masters in Communication program in 2007. Most of the content is still very relevant today. Topics: Lightweight authoring, blogs, and wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Shelly D. Farnham, Ph.D.
You've heard the hype, but do you know what exactly "Web 2.0" and "social media" refer to, and more importantly, how they can help your organization? This introductory workshop is designed to help you understand the implications of social media for your organization's communications strategy and gain confidence in navigating the language and tools of the modern online experience. Presentation delivered as part of the "Social Media 101" training in Atlanta at the Georgia Center for Nonprofits (GCN) as part of their series on social media trainings (see www.ifpeople.net/learn ).
Social Media 101: Online Communication as Stakeholder Engagement
Social Media 101: Online Communication as Stakeholder Engagement
ifPeople
Design For Social Sharing
Design For Social Sharing
guru100
Locked
Locked
guru876
Social media 101 for campuses involved with Journalists for Human Rights.
Social Media for School Chapters
Social Media for School Chapters
Justine Abigail
In this presentation, we introduce Twitter, a popular microblogging service; Delicious, a web-based tool to manage and share bookmarks; and LinkedIn, a professional networking site with over 50 million members. We provide an overview of each tool, demonstrate uses for teaching, learning and professional networking, as well as review basic security features. This presentation was developed for and delivered to members of the UMass Medical School community in December 2009 as part of a Social Media Seminar Series sponsored by the Department of Medicine and the Lamar Soutter Library.
Introduction to Social Media: The web is ready for you
Introduction to Social Media: The web is ready for you
Carrie Saarinen
Similar a Social Search Concept In Jaanix1
(20)
Jaanix Revisited
Jaanix Revisited
Nctc social media 2011
Nctc social media 2011
How to Use Blogs, Twitter & LinkedIn for Legal Professionals
How to Use Blogs, Twitter & LinkedIn for Legal Professionals
Introduction to Social Media
Introduction to Social Media
Online Piracy Project
Online Piracy Project
Leveraging the Power of B2B Social Communities
Leveraging the Power of B2B Social Communities
Ecls Social Web Nov 2008
Ecls Social Web Nov 2008
The Social Web
The Social Web
Social Networking (CBPL)
Social Networking (CBPL)
Social media for councils june 10
Social media for councils june 10
8 Teaching and Learning Websites Mentioned by AASL
8 Teaching and Learning Websites Mentioned by AASL
Social Media – Lotteries Council 2011
Social Media – Lotteries Council 2011
Using Social Media Effectively -SociallyActive
Using Social Media Effectively -SociallyActive
Social media for academic and career development
Social media for academic and career development
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Web .20 Class Week 6: Lightweight Authoring, Blogs, Wikis
Social Media 101: Online Communication as Stakeholder Engagement
Social Media 101: Online Communication as Stakeholder Engagement
Design For Social Sharing
Design For Social Sharing
Locked
Locked
Social Media for School Chapters
Social Media for School Chapters
Introduction to Social Media: The web is ready for you
Introduction to Social Media: The web is ready for you
Último
MySQL Webinar, presented on the 25th of April, 2024. Summary: MySQL solutions enable the deployment of diverse Database Architectures tailored to specific needs, including High Availability, Disaster Recovery, and Read Scale-Out. With MySQL Shell's AdminAPI, administrators can seamlessly set up, manage, and monitor these solutions, ensuring efficiency and ease of use in their administration. MySQL Router, on the other hand, provides transparent routing from the application traffic to the backend servers in the architectures, requiring minimal configuration. Completely built in-house and supported by Oracle, these solutions have been adopted by enterprises of all sizes for their business-critical applications. In this presentation, we'll delve into various database architecture solutions to help you choose the right one based on your business requirements. Focusing on technical details and the latest features to maximize the potential of these solutions.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Created by Mozilla Research in 2012 and now part of Linux Foundation Europe, the Servo project is an experimental rendering engine written in Rust. It combines memory safety and concurrency to create an independent, modular, and embeddable rendering engine that adheres to web standards. Stewardship of Servo moved from Mozilla Research to the Linux Foundation in 2020, where its mission remains unchanged. After some slow years, in 2023 there has been renewed activity on the project, with a roadmap now focused on improving the engine’s CSS 2 conformance, exploring Android support, and making Servo a practical embeddable rendering engine. In this presentation, Rakhi Sharma reviews the status of the project, our recent developments in 2023, our collaboration with Tauri to make Servo an easy-to-use embeddable rendering engine, and our plans for the future to make Servo an alternative web rendering engine for the embedded devices industry. (c) Embedded Open Source Summit 2024 April 16-18, 2024 Seattle, Washington (US) https://events.linuxfoundation.org/embedded-open-source-summit/ https://ossna2024.sched.com/event/1aBNF/a-year-of-servo-reboot-where-are-we-now-rakhi-sharma-igalia
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
I've been in the field of "Cyber Security" in its many incarnations for about 25 years. In that time I've learned some lessons, some the hard way. Here are my slides presented at BSides New Orleans in April 2024.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
An excellent report on AI technology, specifically generative AI, the next step after ChatGPT from Epam. Impact Assessments, Road Charts with fully updated Results and new charts.
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Presented by Sergio Licea and John Hendershot
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
This project focuses on implementing real-time object detection using Raspberry Pi and OpenCV. Real-time object detection is a critical aspect of computer vision applications, allowing systems to identify and locate objects within a live video stream instantly.
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
45-60 minute session deck from introducing Google Apps Script to developers, IT leadership, and other technical professionals.
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Microsoft's Threat Matrix for Kubernetes helps organizations understand the attack surface a Kubernetes deployment introduces to their environments. This ensures that adequate detections and mitigations are in place. By covering over 40 different attacker techniques, defenders can learn about Kubernetes-specific mitigations and controls to deploy to their environments. In this session, we will explore the MS-TA9013 Host Path Mount technique, which is commonly used by attackers to perform privilege escalation in a Kubernetes cluster. Attendees will learn how attackers and defenders can: * Escape the container's host volume mount to gain persistence on an underlying node * Move laterally from the underlying node into the customer's cloud environment * Analyze Kubernetes audit logs to detect pods deployed with a hostPath mount * Deploy an admission controller that prevents new pods from using a hostPath mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
With more memory available, system performance of three Dell devices increased, which can translate to a better user experience Conclusion When your system has plenty of RAM to meet your needs, you can efficiently access the applications and data you need to finish projects and to-do lists without sacrificing time and focus. Our test results show that with more memory available, three Dell PCs delivered better performance and took less time to complete the Procyon Office Productivity benchmark. These advantages translate to users being able to complete workflows more quickly and multitask more easily. Whether you need the mobility of the Latitude 5440, the creative capabilities of the Precision 3470, or the high performance of the OptiPlex Tower Plus 7010, configuring your system with more RAM can help keep processes running smoothly, enabling you to do more without compromising performance.
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
What are drone anti-jamming systems? The drone anti-jamming systems and anti-spoof technology protect against interference, jamming, and spoofing of the UAVs. To protect their security, countries are beginning to research drone anti-jamming systems, also known as drone strike weapons. The anti-jam and anti-spoof technology protects against interference, jamming and spoofing. A drone strike weapon is a drone attack weapon that can attack and destroy enemy drones. So what is so unique about this amazing system?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
writing some innovation for development and search
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Choosing the right accounts payable services provider is a strategic decision that can significantly impact your business's financial performance and operational efficiency. By considering factors such as expertise, range of services, technology infrastructure, scalability, cost, and reputation, businesses can make informed decisions and select a provider that aligns with their unique needs and objectives. Partnering with the right provider can streamline accounts payable processes, drive cost savings, and position your business for long-term success. https://katprotech.com/accounts-payable-and-purchase-order-automation/
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Read about the journey the Adobe Experience Manager team has gone through in order to become and scale API-first throughout the organisation.
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Slack App Development 101
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Discord is a free app offering voice, video, and text chat functionalities, primarily catering to the gaming community. It serves as a hub for users to create and join servers tailored to their interests. Discord’s ecosystem comprises servers, each functioning as a distinct online community with its own channels dedicated to specific topics or activities. Users can engage in text-based discussions, voice calls, or video chats within these channels. Understanding Discord Servers Discord servers are virtual spaces where users congregate to interact, share content, and build communities. Servers may revolve around gaming, hobbies, interests, or fandoms, providing a platform for like-minded individuals to connect. Communication Features Discord offers a range of communication tools, including text channels for messaging, voice channels for real-time audio conversations, and video channels for face-to-face interactions. These features facilitate seamless communication and collaboration. What Does NSFW Mean? The acronym NSFW stands for “Not Safe For Work,” indicating content that may be inappropriate for professional or public settings. NSFW Content NSFW content encompasses material that is sexually explicit, violent, or otherwise graphic in nature. It often includes nudity, profanity, or depictions of sensitive topics.
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Discover the advantages of hiring UI/UX design services! Our blog explores how professional design can enhance user experiences, boost brand credibility, and increase customer engagement. Learn about the latest design trends and strategies that can help your business stand out in the digital landscape. Elevate your online presence with Pixlogix's expert UI/UX design services.
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Último
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Slack Application Development 101 Slides
Slack Application Development 101 Slides
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Social Search Concept In Jaanix1
1.
2.
3.
4.
5.
6.
YouTube videos aggregator:
7.
8.
9.
10.
11.
Jaanix prototypes: Style
12.
Jaanix prototypes: events
13.
14.
15.
16.
Posting process: one
click
17.
LiveJournal: posting a
picture
18.
Blogger: posting a
video
19.
Reddit: link submission
20.
Series of A/B
testing: ratings
21.
Series of A/B
testing: Rating tools
22.
Stars vs. sliders
23.
Picture size
24.
Analysis of comments:
25.
Log analysis
26.
Registered users statistics:
sliders vs. votes usage
27.
28.
29.
30.
Heat maps: users
want to see like-minded people
31.
32.
33.
34.
35.
36.
37.
Descargar ahora