My journey of social media discovery - applied to knowledge management, quality management, project management, reliability, lean & maintenance engineering - implications for information management governance
Decentralized Social Networks - WebVisions 2009David Recordon
One theme of 2008 that has led into 2009 is the idea of social networks transforming from monolithic individual sites to peer sites that share people, content, information.
Technologies such as OpenID, OAuth, OpenSocial and Portable Contacts can be combined to help create this vision, though what will it actually look like when it works?
This talk will look at the philosophical changes being led by companies like MySpace, Google, Plaxo and Six Apart, their impact on social networks like Facebook which traditionally haven't embraced this vision, and how these technologies are being used to make this vision reality.
This document discusses how social networks and government can interact. It introduces Silona Bonewald, who has been online since the 1980s and has experience in politics, web development, and starting an ISP. The document hints at how who someone knows online can help define them, and how Silona's personal and business websites and associations provide information about her identity and background.
The document outlines an agenda for a presentation on Adobe's customer experience solutions and digital enterprise platform. The agenda includes introductions to Adobe and customer experience management, presenting Adobe's customer experience solutions and digital platform, and partnering opportunities. The presentation aims to demonstrate how Adobe's solutions can help organizations optimize their customer experience across digital channels.
Top 10 need-to-knows_about_social_networking_and_where_it_is_headed.pdf[1]Tere Solis
Social networking is the most popular online activity worldwide, accounting for 19% of all time spent online. Nearly 1 in every 5 minutes spent online is now spent on social networking sites. The growth of social networking is a global phenomenon that has seen widespread adoption across different countries and cultures, demonstrating its universal appeal as a way for people to connect online.
Company 2.0 - Solvay Entrepreneurs May 2012David Hachez
This document provides an overview of social media and its integration into business. It discusses the evolution from traditional media to social media, defines key concepts like enterprise 2.0 and personal branding. It then provides a step-by-step guide to using social media and concludes by emphasizing the importance of understanding human psychology and empathy to effectively engage with social media.
A presentation made by Janette Toral at the "Business Review: Highlights and Foresights" event last January 31, 2012 at AIM Acceed Conference Center. The event was organized by the Asian Centre for Enterprise Development (http://ascendph.com).
Decentralized Social Networks - WebVisions 2009David Recordon
One theme of 2008 that has led into 2009 is the idea of social networks transforming from monolithic individual sites to peer sites that share people, content, information.
Technologies such as OpenID, OAuth, OpenSocial and Portable Contacts can be combined to help create this vision, though what will it actually look like when it works?
This talk will look at the philosophical changes being led by companies like MySpace, Google, Plaxo and Six Apart, their impact on social networks like Facebook which traditionally haven't embraced this vision, and how these technologies are being used to make this vision reality.
This document discusses how social networks and government can interact. It introduces Silona Bonewald, who has been online since the 1980s and has experience in politics, web development, and starting an ISP. The document hints at how who someone knows online can help define them, and how Silona's personal and business websites and associations provide information about her identity and background.
The document outlines an agenda for a presentation on Adobe's customer experience solutions and digital enterprise platform. The agenda includes introductions to Adobe and customer experience management, presenting Adobe's customer experience solutions and digital platform, and partnering opportunities. The presentation aims to demonstrate how Adobe's solutions can help organizations optimize their customer experience across digital channels.
Top 10 need-to-knows_about_social_networking_and_where_it_is_headed.pdf[1]Tere Solis
Social networking is the most popular online activity worldwide, accounting for 19% of all time spent online. Nearly 1 in every 5 minutes spent online is now spent on social networking sites. The growth of social networking is a global phenomenon that has seen widespread adoption across different countries and cultures, demonstrating its universal appeal as a way for people to connect online.
Company 2.0 - Solvay Entrepreneurs May 2012David Hachez
This document provides an overview of social media and its integration into business. It discusses the evolution from traditional media to social media, defines key concepts like enterprise 2.0 and personal branding. It then provides a step-by-step guide to using social media and concludes by emphasizing the importance of understanding human psychology and empathy to effectively engage with social media.
A presentation made by Janette Toral at the "Business Review: Highlights and Foresights" event last January 31, 2012 at AIM Acceed Conference Center. The event was organized by the Asian Centre for Enterprise Development (http://ascendph.com).
Top 10 need-to-knows_about_social_networking_and_where_it_is_headedDr. William J. Ward
1. Social networking has become the most popular online activity worldwide, accounting for 19% of time spent online and reaching 82% of the global online population representing 1.2 billion users.
2. While social networking behavior reflects some regional differences, it has grown proportionately across all regions as internet adoption increased, demonstrating its universal appeal as the practice of engaging in online social networking has become comparatively ubiquitous.
3. The continued growth of time spent on social networks, which has more than tripled in recent years, shows that social networking has evolved to become an integral part of the global online experience.
This document discusses Drupal, an open-source content management system. It provides an overview of Drupal's history and capabilities, how easy it is to use, who maintains it, and high-profile organizations that use it like the White House, NASA, Google, and universities. The document promotes Drupal as providing features to easily construct rich websites and that its open source nature improves security. It also advertises books and training from the author's company.
This document discusses the opportunities and security risks of using social media in enterprises. It notes that while social media can enable better collaboration, integration and connectivity, its adoption also poses security challenges as hackers target these platforms. The document examines how businesses are embracing social media as a tool, the rise in spam and malware attacks observed on these sites, and provides recommendations for securing enterprise social media use.
This document discusses social software and IBM solutions for social collaboration. It begins with an introduction and overview of social software, noting how it has enabled interaction and information sharing through sites like Facebook and YouTube. It then discusses IBM solutions for social collaboration, including Lotus Connections for on-premise deployment and LotusLive as a software-as-a-service offering. Both provide features like profiles, blogs, files sharing, and activities. The document concludes by highlighting benefits experienced by IBM through increased productivity, knowledge sharing, and skills development using social software.
This document discusses how social networking tools are transforming how organizations manage employee identities by allowing employees to construct their own social profiles and roles. While social tools can break down silos and promote collaboration, they also raise identity and security concerns if profiles, activities, and roles from internal and external social networks become interconnected and visible. The document analyzes several use cases that demonstrate both the benefits and risks of how employee social identities constructed within and outside the organization may collide or become correlated within enterprise systems.
We Need Data: Philippine Information Society Data Alliance Project Janette Toral
A discussant paper presented by Janette Toral at the National Statistical Coordination Board Meeting last January 18, 2012 in response to the "Formulation of the Philippine Society Development Program 2011-2017 - Chapter on Information Society Statistics".
Alterra Business Consulting LinkedIn activityAlterra
This document is Amanda Brown's profile page on LinkedIn, which contains 23 updates. It shows her connections, groups, companies of interest, location in St Albans UK, and industry of management consulting. The updates are a mix of links Brown shared, comments she made on other posts, and discussions she participated in about topics like using LinkedIn, invoices, and commercial property valuations.
This document discusses knowledge sharing platforms and tools that people and corporations are using on the web, including blogs, wikis, social networking, social bookmarking, and RSS newsreaders. It provides examples and descriptions of popular sites for each tool, such as LinkedIn for social networking, Delicious for social bookmarking, and RSS readers for accessing updates from subscribed feeds.
The document discusses the evolution of social web technologies towards more open and decentralized standards like OpenID, OAuth, and portable contacts. It describes the pain points that these standards aim to address, such as users having to repeatedly sign up and re-enter information across different social networks. It outlines how these standards are being adopted by major players and are helping to realize the vision of giving users control over their own social data and identity.
Online activities can have both positive and negative social impacts. Positively, online activities allow for convenient communication and access to information. However, overreliance on technology can negatively impact social interactions and health. Increased online activity may also lead to social isolation as people spend more time alone on computers rather than interacting in person. Additionally, extensive computer use can cause issues like eyestrain, obesity, and addiction. The internet also introduces threats like hacking, identity theft, stalking, and spreading of misinformation that can endanger users. Security precautions are needed to counter online risks.
Creating Award Winning Integrated Marketing CampaignsJanette Toral
Presentation made by Janette Toral at the Innovation Summit 2012 event of Norde International Distributors at Ang Bahay ng Alumni, University of the Philippines, Diliman, Quezon City last February 8, 2012.
This document discusses the evolution of technology in education from 1985 to present day. It outlines how hardware, software, users and uses of technology have changed over time in both education and society generally. It then focuses on how computers can now be used as a subject in education from beginner to more advanced levels, teaching important digital skills. Finally, it examines how Web 2.0 technologies like social networking, blogging and wikis can support learning across subjects when students have the necessary skills to use these tools.
This document discusses key aspects of Web 2.0 including interpersonal computing, web services, and software as a service (SaaS). Examples of Web 2.0 include wikis, blogs, social networking sites, and viral videos. The core principles involve improved interconnections between resources and harnessing collective intelligence. However, threats exist such as viruses spread through social media sites, and protection through antivirus software and safe online practices is important.
차세대 쇼셜 네트워크 서비스에 대한 발표자료로서 2009년 2월 26일 KRnet 이다.
KRnet이란 'korea Internet Conference'로서 그 중 'Track : Convergence Promotion Services'에서 'Track : Convergence Promotion Services'의 발표자료이다. 발표제목은 'Next Social Network Service'이며 내용은 다음과 같다.
소셜네트워크 서비스란 쉽게 말해 ‘나의 프로필을 네트워크에 공유하여, 구인/구직에 실질적인 도움을 주는 웹 서비스의 일종이다. 그러나 쇼셜 네트워크란 아날로적 인맥망에서부터 시작하여 디지털 인맥망으로, 사회학에서부터 소프트웨어 개발학으로까지, 구인/구직의 연결망에서 관계의 매듭을 열어가는 연결망으로 발전 중에 있다. 본 강연은 네트워크 이론에 의한 수렴과 확산의 상호질서를 바
탕으로 소셜 서비스의 발전 과정과 그 의의를 진단한다. 특히 단문 서비스 중심의 소셜 서비스인 트위터(twitter), 이미지 기반의 소셜 서비스인 플리커(flickr), 동영상 맥락의 소셜 서비스인 유튜브(youtube), 프로필 중심의 소셜 서비스인 마이스페이스(myspace) 등이 각 매체의 허브로서 역할하며 어떻게 사회, 문화, 비즈니스적인 변화를 주는지를 소개한다. 강연을 통해 소셜 서비스의 각 허브들이 상
호작용하여 수렴되는 쇼셜 네트워크에서의 아이텐티가 어떻게 개인을 설명해주고 신뢰해주는 메커니즘을 가지는지를 분석할 예정이다. 즉 소셜 서비스란 개인과 집단의 신뢰의 증진을 위한 관계 맺기 서비스이다.
How Businesses Use Web 2.0 and Social Media. Presentation by Charlie Kreitzberg and Anne Pauker Kreitzberg, Cognetics at CIO Summit, April 2009, Valley Forge, PA. www.cognetics.com
Top 10 need-to-knows_about_social_networking_and_where_it_is_headedDr. William J. Ward
1. Social networking has become the most popular online activity worldwide, accounting for 19% of time spent online and reaching 82% of the global online population representing 1.2 billion users.
2. While social networking behavior reflects some regional differences, it has grown proportionately across all regions as internet adoption increased, demonstrating its universal appeal as the practice of engaging in online social networking has become comparatively ubiquitous.
3. The continued growth of time spent on social networks, which has more than tripled in recent years, shows that social networking has evolved to become an integral part of the global online experience.
This document discusses Drupal, an open-source content management system. It provides an overview of Drupal's history and capabilities, how easy it is to use, who maintains it, and high-profile organizations that use it like the White House, NASA, Google, and universities. The document promotes Drupal as providing features to easily construct rich websites and that its open source nature improves security. It also advertises books and training from the author's company.
This document discusses the opportunities and security risks of using social media in enterprises. It notes that while social media can enable better collaboration, integration and connectivity, its adoption also poses security challenges as hackers target these platforms. The document examines how businesses are embracing social media as a tool, the rise in spam and malware attacks observed on these sites, and provides recommendations for securing enterprise social media use.
This document discusses social software and IBM solutions for social collaboration. It begins with an introduction and overview of social software, noting how it has enabled interaction and information sharing through sites like Facebook and YouTube. It then discusses IBM solutions for social collaboration, including Lotus Connections for on-premise deployment and LotusLive as a software-as-a-service offering. Both provide features like profiles, blogs, files sharing, and activities. The document concludes by highlighting benefits experienced by IBM through increased productivity, knowledge sharing, and skills development using social software.
This document discusses how social networking tools are transforming how organizations manage employee identities by allowing employees to construct their own social profiles and roles. While social tools can break down silos and promote collaboration, they also raise identity and security concerns if profiles, activities, and roles from internal and external social networks become interconnected and visible. The document analyzes several use cases that demonstrate both the benefits and risks of how employee social identities constructed within and outside the organization may collide or become correlated within enterprise systems.
We Need Data: Philippine Information Society Data Alliance Project Janette Toral
A discussant paper presented by Janette Toral at the National Statistical Coordination Board Meeting last January 18, 2012 in response to the "Formulation of the Philippine Society Development Program 2011-2017 - Chapter on Information Society Statistics".
Alterra Business Consulting LinkedIn activityAlterra
This document is Amanda Brown's profile page on LinkedIn, which contains 23 updates. It shows her connections, groups, companies of interest, location in St Albans UK, and industry of management consulting. The updates are a mix of links Brown shared, comments she made on other posts, and discussions she participated in about topics like using LinkedIn, invoices, and commercial property valuations.
This document discusses knowledge sharing platforms and tools that people and corporations are using on the web, including blogs, wikis, social networking, social bookmarking, and RSS newsreaders. It provides examples and descriptions of popular sites for each tool, such as LinkedIn for social networking, Delicious for social bookmarking, and RSS readers for accessing updates from subscribed feeds.
The document discusses the evolution of social web technologies towards more open and decentralized standards like OpenID, OAuth, and portable contacts. It describes the pain points that these standards aim to address, such as users having to repeatedly sign up and re-enter information across different social networks. It outlines how these standards are being adopted by major players and are helping to realize the vision of giving users control over their own social data and identity.
Online activities can have both positive and negative social impacts. Positively, online activities allow for convenient communication and access to information. However, overreliance on technology can negatively impact social interactions and health. Increased online activity may also lead to social isolation as people spend more time alone on computers rather than interacting in person. Additionally, extensive computer use can cause issues like eyestrain, obesity, and addiction. The internet also introduces threats like hacking, identity theft, stalking, and spreading of misinformation that can endanger users. Security precautions are needed to counter online risks.
Creating Award Winning Integrated Marketing CampaignsJanette Toral
Presentation made by Janette Toral at the Innovation Summit 2012 event of Norde International Distributors at Ang Bahay ng Alumni, University of the Philippines, Diliman, Quezon City last February 8, 2012.
This document discusses the evolution of technology in education from 1985 to present day. It outlines how hardware, software, users and uses of technology have changed over time in both education and society generally. It then focuses on how computers can now be used as a subject in education from beginner to more advanced levels, teaching important digital skills. Finally, it examines how Web 2.0 technologies like social networking, blogging and wikis can support learning across subjects when students have the necessary skills to use these tools.
This document discusses key aspects of Web 2.0 including interpersonal computing, web services, and software as a service (SaaS). Examples of Web 2.0 include wikis, blogs, social networking sites, and viral videos. The core principles involve improved interconnections between resources and harnessing collective intelligence. However, threats exist such as viruses spread through social media sites, and protection through antivirus software and safe online practices is important.
차세대 쇼셜 네트워크 서비스에 대한 발표자료로서 2009년 2월 26일 KRnet 이다.
KRnet이란 'korea Internet Conference'로서 그 중 'Track : Convergence Promotion Services'에서 'Track : Convergence Promotion Services'의 발표자료이다. 발표제목은 'Next Social Network Service'이며 내용은 다음과 같다.
소셜네트워크 서비스란 쉽게 말해 ‘나의 프로필을 네트워크에 공유하여, 구인/구직에 실질적인 도움을 주는 웹 서비스의 일종이다. 그러나 쇼셜 네트워크란 아날로적 인맥망에서부터 시작하여 디지털 인맥망으로, 사회학에서부터 소프트웨어 개발학으로까지, 구인/구직의 연결망에서 관계의 매듭을 열어가는 연결망으로 발전 중에 있다. 본 강연은 네트워크 이론에 의한 수렴과 확산의 상호질서를 바
탕으로 소셜 서비스의 발전 과정과 그 의의를 진단한다. 특히 단문 서비스 중심의 소셜 서비스인 트위터(twitter), 이미지 기반의 소셜 서비스인 플리커(flickr), 동영상 맥락의 소셜 서비스인 유튜브(youtube), 프로필 중심의 소셜 서비스인 마이스페이스(myspace) 등이 각 매체의 허브로서 역할하며 어떻게 사회, 문화, 비즈니스적인 변화를 주는지를 소개한다. 강연을 통해 소셜 서비스의 각 허브들이 상
호작용하여 수렴되는 쇼셜 네트워크에서의 아이텐티가 어떻게 개인을 설명해주고 신뢰해주는 메커니즘을 가지는지를 분석할 예정이다. 즉 소셜 서비스란 개인과 집단의 신뢰의 증진을 위한 관계 맺기 서비스이다.
How Businesses Use Web 2.0 and Social Media. Presentation by Charlie Kreitzberg and Anne Pauker Kreitzberg, Cognetics at CIO Summit, April 2009, Valley Forge, PA. www.cognetics.com
The document discusses communication tools and trends for a school district steering committee. It outlines how technology can increase efficiency, automation, and effectiveness in schools. It also describes synchronous tools that enable real-time communication, asynchronous tools that allow communication over time, and trends toward transparency and reducing information overload through "unplugging" and "digital diets." Key communication modes and tools used by the school district are also presented.
This presentation looks at "web2" in the context of human experience, suggesting that the social web as extension of "real life" means that it transcends the marketing-biased, "numbered web" hype that has typically surrounded it.
The slides focus particularly on the use of "social web" tools in the enterprise.
I will present these slides at Online Information 4th December 2008. See http://www.online-information.co.uk/online08/seminar_description_ims.html?presentation_id=442 for more information
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
Summary of massive changes underway in the enterprise IT marketplace being driven by social, mobile, and cloud, and the implications of these changes on what it means to be an information professional.
http://www.aiim.org/certification
Marshall Sponder - Social Media Monitoring Analytics - Measure13Our Social Times
Social media data provides both opportunities and challenges for businesses. While businesses have access to large amounts of structured and unstructured data, making sense of it and integrating different data sources is difficult. Current social media monitoring platforms do not natively interface with each other or a business's other systems. This makes it challenging for businesses to access, analyze, and take action on all of their available social data in a cost effective way. Future social networks and tools may better enable users and businesses to easily understand and utilize large amounts of social information.
A lecture prepared for the first session of the "Certificate in Community Management" proposed by Ichec. More info available here: http://www.ichec-entreprises.be/certificat_en_community_management-6993.html
This document discusses how companies can manage knowledge by valuing human capital through the use of various Web 2.0 technologies. It provides examples of how companies like Capgemini, Siemens, IBM, and Sogeti have adopted tools like blogs, wikis, podcasts, and social networks to enable individual and group learning, broad communication and collaboration, and knowledge acquisition, claim formulation, and processes.
Your company & the “social stuff” - advancedDavid Hachez
This document provides an agenda and overview for a presentation on personal branding and social media. The summary is:
1. The presentation covers personal branding, sharing experiences on social media, and a step-by-step guide to using social media.
2. Key aspects of social media discussed include having a clear focus, being user-centric, having an open source attitude, and embracing constant change.
3. The step-by-step guide includes establishing an online identity, learning from mistakes, developing a strategy, selecting appropriate tools, focusing efforts, measuring results, and continually improving one's approach.
Web 2.0 At Work - Simple And Social Collaboration Between CoworkersAcando Consulting
This is a presentation from an "awareness seminar" held by Oscar Berg and Henrik Gustafsson from Acando about how Web 2.0 principles and social tools can be used to improve collaboration, knowledge exchange and innovation in an enterprise context.
Sample investor presentation for other entrepreneurs to look at. Our old slides for GoingOn Networks from 2007, which is a social media platform for companies and organizations. BusinessWeek recognized GoingOn Networks in their "Best of the Web: Social Networking Tools" list for 2007.
Is Social Networking Something Advertisers Can Ignore ?... Or Is It The Next ...Hugues Rey
This document discusses social networking and its potential impact on business and advertising. It provides background on the growth of social networking, especially Facebook, in Belgium. It examines whether social networking is currently hype or has real potential. The document concludes that social networking, led by Facebook, is a major trend that businesses need to engage with through communication rather than advertising. Both mass and social media will be important parts of business conversations going forward.
This document discusses social networking and its potential impact on business and advertising. It provides background on the growth of social networking, especially Facebook, in Belgium. It examines whether social networking is currently hype or has real potential. The document concludes that social networking, led by Facebook, is a major trend that businesses need to engage with through communicating with customers online rather than traditional advertising. Both mass and social media will be important parts of business conversations with customers going forward.
Big Data bring big value to Social CRM – Andrea IncalzaOpenKnowledge srl
Big data brings big value to social CRM by enabling companies to gain insights from a wealth of customer data sources. However, with the abundance of available data comes challenges of extracting useful information and addressing issues of data security, privacy and change management. To leverage big data, companies need tools and talent to analyze diverse data types like social media, transactions, locations and more to better understand customer experiences, attitudes and behaviors in order to improve customer targeting, service and relationships.
Big data bring big value to the Social CRMAndrea Incalza
Big data brings big value to social CRM by enabling companies to gain insights from a wealth of customer data sources. However, with more data comes the challenge of extracting useful information from large, fast-streaming datasets. Social CRM aims to engage customers through collaborative conversations to provide mutual value. It represents a shift from traditional CRM approaches towards leveraging social media and customer interactions on various online platforms. While big data analytics can provide valuable descriptive and predictive insights, companies must address issues of data privacy, security, and developing an analytical culture to fully realize the benefits of social CRM.
Marketing & Sales - Founder institute BrusselsDavid Hachez
This document outlines a framework for developing and executing a business idea through four phases: Define, Drive, Deliver, and Reward.
The Define phase is about gathering information about the business idea such as the name, value proposition, business model, and target audience. The Drive phase is focused on amplifying the idea and making it known through marketing, content creation, and bringing on early customers. The Deliver phase is the execution stage where the right team is assembled, partnerships are formed, and focus is maintained. The Reward phase is about cherishing and rewarding customers and employees to turn them into ambassadors for the business.
Similar a Hitching A Ride Through the Knowledge Universe on the Social Media Express (20)
Hitching a ride in Old and New Lands in the Genealogy World on the Social Med...KerrieAnne Christian
Social Media in Genealogy & Family History cannot be ignored.
How can Facebook, Twitter, Google + and Blogs be used for Genealogy Groups & personal Family History Research ?
What are the first steps in using these tools ?
Lost Village : Sherbrooke & Black Diamond Railway Museum Bulli Australia U3A ...KerrieAnne Christian
The story of the Lost Village of Sherbrooke on Bulli Mountain sacrificed for Cataract Dam - and the Black Diamond Heritage Centre Railway Museum at Bulli NSW Australia
The document discusses various aspects of document control systems, including typical structures, procedures for control, and verification. It notes that effective document control is important for integrated management systems covering activities like manufacturing, health and safety, and environmental management. Controlled documents must be properly numbered, approved, maintained and obsolete versions removed from circulation.
This summary provides the key information from tweets about the #KMAus10 conference:
1. Attendees discussed topics like using technology to enable knowledge management, treating employees as stakeholders, and using discussion forums and social media for collaboration and conversations rather than just broadcasting.
2. A link was shared to an online database of social media guidelines.
3. One participant thanked another for capturing the Twitter conversation about the conference using the #KMAus10 hashtag.
This document summarizes tweets from the #KMAUS10 conference on July 22, 2010. Attendees discussed using Confluence for wikis and collaboration. A slideshare of day one tweets was uploaded. Positive feedback was shared about interactive sessions. Discussions covered using social media policies to guide employees while allowing communities to self-police. The conference concluded with congratulations to all who participated.
- The document appears to be a collection of tweets from July 21, 2010 related to the conference #KMAus10 (Knowledge Management Australia 2010).
- Many of the tweets discuss and debate topics from sessions at the conference, including knowledge sharing vs. knowledge management, encouraging collaboration, the semantic web, and decision making.
- Other tweets help provide a sense of the event, mentioning networking drinks, thanking those who live tweeted the sessions, and noting the end of the first day of the conference.
Stan Garfield gave a presentation at the July 19, 2010 #KMLF meeting in Melbourne about building successful online communities. He outlined 10 principles for communities and discussed metrics for measuring community health such as participation, stories, and activity levels. Attendees tweeted about the valuable insights on community development and found the slides on building communities to be very useful.
A how-to manual on technical report writing - why the art of Chocolate Cake ?
I was asked to "throw " a presentation together with minimal time to prepare - tech report writing could be a very dry subject - but then I decided to compare it with baking a chocolate cake - either very simple or extremely complex
The key issue is to deliver what the consumer wants - a relevant report or a delicious chocolate cake.
This document discusses the role of engineers beyond just engineering design and construction. It discusses how engineers must consider human factors, communication skills, financial and safety impacts of their designs. It also discusses the importance of breaking down silos between different engineering disciplines and sharing knowledge across departments. Finally, it addresses the need for diversity in engineering and succession planning to pass on institutional knowledge to new generations of engineers.
This document discusses knowledge management and its application to project management. It provides a list of experts in the fields of project management, knowledge sharing, and knowledge management. It also discusses challenges such as capturing knowledge from original project teams, explaining projects to stakeholders, and managing risks, including unknown risks. Case studies mentioned include rebuilding the Parthenon and the unfinished project of Gaudi's La Sagrada Familia in Barcelona.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Hitching A Ride Through the Knowledge Universe on the Social Media Express
1. Hitching a Ride through
the Knowledge Universe -
on the Social Media Express
@KerrieAnne
aka KerrieAnne Christian
2. Social Media Express – which carriage to hop in ?
“It’s all
Greek
to me”
-
Athens
Metro
3. Social Media
How
to
Choose ?
Too
Many
Choices !
Source - http://webdesignledger.com/freebies/the-best-social-media-icons-all-in-one-place
4. Social Media Express – which carriage to hop in ?
Facebook – MySpace - more social <-> IM Chat <-> Communicator
Flickr – Picasa - YouTube etc – social but educative content growing
Web 2.0 - incl. COP’s we contribute Virtual Private
Enterprise 2.0 Web 2.0 inside firewall eg Sharepoint Clouds
eg Science
LinkedIn like Facebook for Professionals Networks
Twitter - microblogginhg
Cloud
Computing
Social Bookmarking we share
eg E Payments Slideshare powerpoints
-Concur Paypal
MMORPG Wikis we contribute
Massive Multiplayer
On line Role Playing Blogs we share
Gaming – eg WOW
RSS
Email, Listservs, WWW - still hitched to E-media trains ?
5. Waiting a while before hopping on the Social Media Express (SME) ...
Is to Decide ...
• more than just not
keeping with KM trends
• others in your org may
opt to ride ahead on
Social Media Express,
outside the firewall
without you, regardless
• to risk losing
governance & control
of some KM assets,
CMS, IP etc
The Fat Controller
Or Not ...
6. Scientists & Engineers don’t seem to be using social media ?
• eg Science is very broad – so network within own science disciplines
• Some existing networking systems work well – why change ?
• NACE – National Association for Corrosion Engineers –
corrosionnetwork – email based – operating for over 11 years – much
more networking than NACE LinkedIn
• EngTips – web based with email alerts – prolific – overload risk
• ASQ – American Society for Quality – comprehensive resource - now
moving into social media – Twitter, Blogs, Communities, Forums
• Elsmar Cove – Quality Community – comprehensive – does RSS
• Source info from online Abstracts services eg ScienceDirect
• IP issues – compete for research $’s vs collaborate in closed communities
• so need ranking by publishing in “right journal”
• Love their email – will use phone as well
7. Impractical policies & rules – risk being ignored
Washing
in
Shanghai
Contrary
to sign on
power pole
prohibiting
it hanging
outside
Windows
8. Google
Etc
provide
social media
resources
outside
Corporate
Firewalls
for employees
working in
increasingly
pressured
circumstances
9. “Google Wave
is a product, platform,
and protocol that
combines aspects of
e-mail, instant
messaging,
wikis, and blogs to
allow real-time and
stored collaborative
messaging. “
10. Social Media
does
Sports :
read in
Google Reader -
RSS streamed
from
What’s
Up
Wollongong
Blog
even lets you
share this page
on Facebook !
11. Sport Does
Social Media
- SMH Ad for
Football Tragic
who also
does
Social Media
to do
soc media on
Australia’s
World Cup Bid
Website
- posted this & got
followed by
@WorldCupBlog !
12. Waiting a while before hopping on the Social Media Express (SME) ...
Is to Decide ...
to risk losing
governance & control of
some KM assets
& Records
Management system
&
others in your org may
opt to ride ahead on
Social Media Express,
outside the firewall
without you, regardless
Or Not ...
13. “KM Newbie - Sometimes feels like sneaking
onto a lifeboat on the KM Superliner”
Lifeboats
on
Norwegian
Jewel
14. So do you only stick with what you know?
Journals
Face to Face only
Email
Internet
Phone Calls
Faxes
Snail Mail
Icecreams
at
Shanghai
McDonalds
15. Or do you want to move outside your comfort zone?
Taking
Tea
at
Summer
Palace
Beijing
16. Social Media : Who to follow ?
You can’t take all roads – how to choose ?
Taking
a breather
from
Shanghai’s
Traffic
17. Should you follow “Brands” aka –KM gurus ?
Jean
Paul
Gaultier -
Shanghai
18. eg follow KM gurus via their Blogs ?
But aren’t blogs bad ?
- self indulgent hot air … or not …
- some old “content types” now
rebadging themselves as blogs eg columnists
19. eg follow KM gurus via their Blogs ?
in KS aka Knowledge Sharing,
Experts are generously sharing
….. their knowledge & insights via their
blogs
20. KS-It’s like choosing Turkish Delight in the
Egyptian Spice Bazaar, Istanbul –follow the experts !
21. @KerrieAnne’s fav Oz Social Media & KM Blogs
• Aide-Memoire
• Annecdote
• Brad Hinton – Plain Speaking
• ChiefTech
• Column Two
• Community Girl
• Cory Banks – (not a blog – but good resources !)
• Digital Ministry – Tim Tyler
• Governance in a Networked World
• Headshift Australia
• Kate Lundy
• Knowledge Matters
• Laurel Papworth – Silkcharm
• Matt Moore – (not a blog – but good resources !)
• Matt’s Musings
• Online Community Engagement
• Step Two Designs
• Yes and Space !
22. @KerrieAnne’s rec’d O/S Social Media & KM Blogs
• Above and Beyond KM • Gurteen Knowledge
• All Life is Problem Solving • Informata
• A Matter of Degree • Interactive Insights
• A Shift in Action • Jack Martin Leith
• Bordeaux & Assoc • KM Edge
• Congitive Edge • Knoco Stories
• Collaboration and Content • Knowledge Board
• Communities and Collaboration • Michael Sampson - Currents
• Community 2.0 • Sacha Chua
• Conversation Agent • Shared Spaces
• Conversation Starter - Harvard • Social Media Rockstar
Business Blogs • The App Gap
• CP Square • The FASTForward Blog
• Elusa.net • The Forrester Blog for Information & Knowledge
Management Professionals
• Enterprise 2.0 Blog
• Future Changes – Grow Your Wiki • ValueNetworks.com
• Globally Local .. Locally Global • Wikinomics
• Green Chameleon
23. LinkedIn – like Facebook for Professionals ?
Great for Connections Position
Position
Vacant !
Vacant !
Some good groups
Popularity
Position
Contest Position
Wanted !
Wanted !
Interaction quality varies
Seems like popularity contest for some
Lots of jobs ads
24. LinkedIn has some good groups, especially ..
• Quality – ASQ related
• Knowledge
• Reliability Engineering – Lean
• Maintenance
25. Seeking Wisdom - in Ancient Greece, people came
to the Oracle at Delphi ....
However
the Oracle
often
seemed
to speak
in
Riddles
Delphi
Greece
26. Twitter : Seeking “WISDOM” from 140 character messages?
“Do you think Twitter will last ?”
“I don’t know – I’m use it now because it connects me with
Knowledge Management gurus”
“Twitter will still be around …
but will probably morph into something else”
…. Ideas on what Twitter might become in the future
27. Twitter & Bulletin Boards ...
“Twitter is really just a 1990’s era (pre WWW &
email) Bulletin Board …
with a few more bells & whistles” ..@KerrieAnne
Who would have thought bulletin board
quot;technologyquot; would become so popular? :)
..@Twitter_Tips
28. Twitter-who are you really connecting with ?
Making up
before the
Peking
Opera
29. Social Media - Better to play it safe ?
Outside
Summer
Palace
Beijing
31. Social Media eg Microblogging : facilitates Global Knowledge Sharing
part of Life Long Learning & building personal knowledge management system at low cost
32. KM : Oral->Books->WWW->Web 2.0->Storytelling
Did you ever hear this ?
“…the Media becomes the Message”
Or is it now …
“We create the Media & the Messages” ?
34. Twitter Warning
Remember ….
It is very easy to get distracted .. http://www.productivedreams.com/
free-twitter-bird-icon-set/
from your main aim … eg KM awareness
Keep heading to your goal …
35. Social Media Taming : Twitter
• Clone yourself with separate ID’s for different
interests
• @KerrieAnne (KM, PM & Social Media focus) becomes …
• @SteelyQueen – QMS & Reliability
• Use Twitter Apps - Tweetdeck or Seesmic
• RSS feed fav Twitters’ streams into GoogleReader
• can scroll’n’tag faster
• Prune those you’re following regularly
• Don’t immediately follow everyone, who is following you –
• check their posts first, for alignment with your interests
• Be careful with “favouriting” too much –
• use Social Bookmarking to save “favourites”
• (if you haven’t already used RSS feed streams)
37. Project Management : @KerrieAnne’s fav social media ...
• Project Management Tips • Project Management Guide
• PM Think! Project Management • Reforming Project Management
Thought Leadership • Leading Virtually
• PM Crunch • Herding Cats
• Project Team Blog • Fear No Project – Project
• @pmtips Management Blog
• @DaveG253 • ProjectSmart.co.uk
• @GanttGuru • Effective Software Development
• @VMaryAbraham • Future Changes – Grow Your Wiki
• @gsanchezs • Wikis in project management
• @pmskills • Project Management resources on
• @thepmtweet Slideshare
• @ProjectSmart • Better Projects (Craig Brown)
• @meolesen • Craig W Brown’s 11 Week PM
Program on Slideshare
38. Social Media Overload -
Sometimes you can get too much of a good thing ...
June 2007
deluge
- breaks
the drought …
Lake Macquarie
Newcastle
39. Overloaded on Social Media Express
– need to capture the whole &/or tag the details?
Terracotta Warriors
Xian - China
40. RSS –Taming Social Media Overload ? ..... But isn’t RSS dead?
“solves a problem for people who regularly use the web...
allows you to easily stay informed by …
retrieving the latest content from the sites you are
interested in.
You save time ….
don’t need to visit each site individually.
You ensure your privacy …
don’t need to join each site’s email newsletter.“
.. From Dailyonetrick
41. Social Media Taming – using RSS
• RSS - What does it do ?
• Stream RSS feeds into a Reader eg Googlereader
• eg Blogs, Twitter streams, Web pages
• RSS - Isn’t it clunky ?
• Depends – can just browse by scrolling through
• Or browse & metadata when scrolling through
• RSS archive - is searchable
42.
43. Share great info (web pages) with your network
eg via Social Bookmarking (eg www.delicious.com – not food related! )
Tourist
Info
Signs
- Santorini
44. Social Bookmarking eg http://delicious.com/KerrieAnneC
• Save time and resources through sharing “bookmarks”
• Encourages people to tag their resources
• (web pages, documents, images, etc)
• With their own logical labels
• to help locate them and other useful resources in
future.
• aids classification, search and retrieval of information.
• Share these tags with the wider audience
• collaboration tool
46. Social Media = even find’n’share Powerpoints
Try the Slideshare Tour
47. Seeking Social Media Benefits : warning : can be too easy to be distracted
Heading for Sphinx & Pyramids - and it’s busy Ramadan Festival in Cairo
48. Seeking Social Media Benefits : Unexpected distractions can keep coming
Still trying to get to the Pyramids – trying to escape Cairo traffic
49. Seeking Social Media Benefits : Persist - it’s worthwhile
Finally - the Pyramids by Camel – Cairo left in the distance
50. Tame distractions – reach your KM goals -
personal growth & learn more than you expected !
Achieving
Something
Undreamt of
-Walking
On the
Great Wall
Of China
Near
Beijing