How to join the twitter chat with Druva Elsa Cariello
A short slideshow showing you how to start on Twitter and join in our next chat #CARMchat
Peter Carfrae Druva’s Sales Manager for UK and Ireland joins us for a Twitter Chat, “30% of corporate data residing on the endpoint today, how are you protecting your data?”
According to the recent survey by Ponemon, where they interviewed 676 IT and IT security practitioners, endpoint security risk is more difficult to manage than ever.
This document discusses texting tips, noting that standard text rates apply, personal phone numbers are not accessible, and that capitalization does not matter for tips but spaces and spelling do. It also provides the tip that capitalization does not matter for tips but spelling and spaces do, and tweets starting with @poll will not be seen by followers.
This is a presentation I gave at the Conference for Global Transformation in San Francisco May 2008. It is an idea developed with my students in a hip-hop class in 2005.
This document appears to be a collection of tweets and notes related to topics of racism and African history. It mentions Twitter hashtags like #thatsafrican and #atbo which seem focused on African topics. Specific people and events referenced include Ota Benga, who was exhibited in the Bronx Zoo, and Louis W. Hicks, who owned a souvenir related to Ota Benga's exhibition. The document also references connections between places like Brooklyn and Oxfordshire as well as the use of "race" by BBC4.
If we are ONE people, one human race, then person-to-person (P2P) we can courageously up-end any stereotype or generalization that makes us feel separate or different. I asked these authors to be the audacity of that!!
The subtitle of our ebook could be "This Little Light of Mine...". It features 37 authors from 5 continents, ages 10 to 63. I, Kyra Gaunt (kyraocityworks.com) curated it through Twitter and Facebook in only 3 weeks. It has been read by over 10,000 people here on Scribd.com since April 3, 2010. It is also available on Slideshare.net.
Join our Facebook fan page. http://www.facebook.com/pages/The-Audacity-of-Humanity-Fan-Page/114692675212231
This ebook is free. Liberate these authors' testimonies of being here and being audacious. Help them let their little light shine. Tweet it, email it, post it on your own site.
This document discusses the history and definitions of racism. It examines how racism was established through events like the Age of Discovery, sanctioned by the Catholic Church through Papal Bulls. This led to the Doctrine of Discovery and laws that justified invading and enslaving indigenous peoples. The impact of these laws and historical trauma can still be seen today in indigenous communities through health, education and employment deficits. The document analyzes how racism operates in societies through conflict theory, structural functionalism and symbolic interactionism. It provides examples of racism in New Zealand and discusses underlying themes like dehumanization and the denial of humanity.
Introduction to The Four Agreements by Ruiz:
"Everything we do is based on agreements we have made - agreements with ourselves, with other people, with God, with life. But the most important agreements are the ones we make with ourselves. In these agreements we tell ourselves who we are, how to behave, what is possible, what is impossible. One single agreement is not such a problem, but we have many agreements that come from fear, deplete our energy and diminish our self-worth."
-Miguel Ruiz
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
How to join the twitter chat with Druva Elsa Cariello
A short slideshow showing you how to start on Twitter and join in our next chat #CARMchat
Peter Carfrae Druva’s Sales Manager for UK and Ireland joins us for a Twitter Chat, “30% of corporate data residing on the endpoint today, how are you protecting your data?”
According to the recent survey by Ponemon, where they interviewed 676 IT and IT security practitioners, endpoint security risk is more difficult to manage than ever.
This document discusses texting tips, noting that standard text rates apply, personal phone numbers are not accessible, and that capitalization does not matter for tips but spaces and spelling do. It also provides the tip that capitalization does not matter for tips but spelling and spaces do, and tweets starting with @poll will not be seen by followers.
This is a presentation I gave at the Conference for Global Transformation in San Francisco May 2008. It is an idea developed with my students in a hip-hop class in 2005.
This document appears to be a collection of tweets and notes related to topics of racism and African history. It mentions Twitter hashtags like #thatsafrican and #atbo which seem focused on African topics. Specific people and events referenced include Ota Benga, who was exhibited in the Bronx Zoo, and Louis W. Hicks, who owned a souvenir related to Ota Benga's exhibition. The document also references connections between places like Brooklyn and Oxfordshire as well as the use of "race" by BBC4.
If we are ONE people, one human race, then person-to-person (P2P) we can courageously up-end any stereotype or generalization that makes us feel separate or different. I asked these authors to be the audacity of that!!
The subtitle of our ebook could be "This Little Light of Mine...". It features 37 authors from 5 continents, ages 10 to 63. I, Kyra Gaunt (kyraocityworks.com) curated it through Twitter and Facebook in only 3 weeks. It has been read by over 10,000 people here on Scribd.com since April 3, 2010. It is also available on Slideshare.net.
Join our Facebook fan page. http://www.facebook.com/pages/The-Audacity-of-Humanity-Fan-Page/114692675212231
This ebook is free. Liberate these authors' testimonies of being here and being audacious. Help them let their little light shine. Tweet it, email it, post it on your own site.
This document discusses the history and definitions of racism. It examines how racism was established through events like the Age of Discovery, sanctioned by the Catholic Church through Papal Bulls. This led to the Doctrine of Discovery and laws that justified invading and enslaving indigenous peoples. The impact of these laws and historical trauma can still be seen today in indigenous communities through health, education and employment deficits. The document analyzes how racism operates in societies through conflict theory, structural functionalism and symbolic interactionism. It provides examples of racism in New Zealand and discusses underlying themes like dehumanization and the denial of humanity.
Introduction to The Four Agreements by Ruiz:
"Everything we do is based on agreements we have made - agreements with ourselves, with other people, with God, with life. But the most important agreements are the ones we make with ourselves. In these agreements we tell ourselves who we are, how to behave, what is possible, what is impossible. One single agreement is not such a problem, but we have many agreements that come from fear, deplete our energy and diminish our self-worth."
-Miguel Ruiz
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
This document provides an overview of Twitter, including its history and key metrics, common Twitter terminology like tweets, replies, retweets and favorites, etiquette for using hashtags and retweeting, and how to set goals and measure success for a Twitter account. It also reviews tools like TweetDeck that can help manage Twitter activities and increase influence, measured by Klout scores. The overall aim is to introduce readers to Twitter and help them get started effectively engaging on the platform.
Twitter is a communication platform where users can share short messages called tweets. The top three reasons people use Twitter are for learning, making connections, and crowd-sourcing information. To use Twitter, one signs up for an account, fills out their profile, follows others on topics of interest, searches for hashtags, and engages by liking, commenting on, and retweeting the tweets of others in their network.
Twitter for Teachers 101: Building Your PLN 140 Characters at a TimeMike Paul
Teachers are discovering that Twitter can be a great resource for professional learning and connecting with other educators. Learn some of the keys to using Twitter as a teacher and see the power of this incredible platform.
The document provides guidance on using Twitter, including:
- Tweets are limited to 140 characters, and can be posted via website or text message.
- Follow relevant people, events, and those your contacts follow to build your network.
- Engage with others by replying to or retweeting their posts, but be polite and on-topic in discussions.
- Hashtags, retweets, and shortened links can help others find and engage with your tweets.
This document provides background information on Twitter and discusses ways to use Twitter in higher education. It begins with quick facts about Twitter's founding in 2006 and current usage statistics. It then outlines 5 powerful ways to use Twitter in higher education according to an article by Dustin Brady: listen and reply to conversations, introduce real people on campus, participate in event backchannels, provide information updates, and use it for personal enrichment. Additional sections define common Twitter terms and features and suggest using HootSuite to schedule social media posts across multiple networks.
Twitter 101 - Building Your PLN 140 Characters at at TimeMike Paul
Learn why so many teachers are using Twitter for Professional Development with this introduction to Twitter. How to create an account, how to use hashtags & lists, and understanding the power of Twitter.
This document provides an introduction to using Twitter, including how to get started, what types of things to tweet about, and tips for making Twitter use easier. It discusses setting up an account, following others and getting followers, using hashtags and mentions, and tools like TweetDeck and Bitly that can help manage tweets. The document emphasizes observing proper etiquette, being careful about direct messages, and remembering that tweets are public statements.
This document provides an introduction to using Twitter. It defines common Twitter terminology like tweets, retweets, followers, hashtags, and direct messages. It explains how Twitter can be used to share thoughts, breaking news in real-time, and experiences from organized events. It provides tips for getting started on Twitter, including setting up a profile, finding people to follow, checking Twitter often, and tips for effective tweeting like keeping tweets concise and including relevant links and hashtags.
1. To build a good Twitter profile, focus on maintaining a good ratio of followers to people you follow and include a bio, photo, and location in your profile.
2. When tweeting, keep messages concise at 100-140 characters, share quality content like blog posts, and use hashtags sparingly to reach relevant audiences.
3. Engaging with others on Twitter through replies, retweets, and mentions is important for gaining followers over time, but the quality of content shared will ultimately determine whether people choose to follow your account.
Originally put this together for a consulting firm that was looking to engage in Twitter, but publishing it here when I heard the news that Ryanair are on Twitter.
A no nonsense presentation for those who want to learn how to start using Twitter. A brief explanation about what Twitter is, who uses Twitter, and how businesses are using it.
Simple slides illustrating how to tweet, reply, & privately message others on Twitter.
Also includes the easiest path to getting started by setting up your profile and finding interesting folks to follow.
The presentation ends with tips for better tweeting and simple ways to gain more followers.
Gary Moneysmith presented information on how to effectively use Twitter for business purposes. The presentation covered how to set up an account, find people to follow, engage in conversations, take photos, use hashtags and third-party applications, and tweet on behalf of a company. It emphasized staying on-brand and authentic, sharing useful information, and having multiple people manage a company account.
This document provides guidance on effective language use for social media. It begins by explaining key differences between the language of websites and social media. Social media language is more informal, conversational, and focused on readability within tight character limits. The document then offers best practices for constructing tweets, including using creative literary devices like alliteration and onomatopoeia. It encourages developing a unique voice and highlights dos and don'ts of social media language. Finally, it prompts practicing various creative tweet constructions to master social media communication.
This document summarizes a discussion at a Tech Club lunch about using Twitter. It explains what Twitter is, how to choose a username, Twitter basics like tweets and hashtags, how to access and sync Twitter, how to use it to find a job, and how to become a thought leader and get help on Twitter. The document provides guidance on making one's Twitter presence employeer-friendly when job searching and lists some Twitter accounts dedicated to job postings organized by company, field, and region.
The document provides an introduction to using Twitter for business purposes. It discusses setting up an account, following others, engaging in conversations, using hashtags and photos, cross-posting to other networks, and tools for easier management of a Twitter profile. The target audience appears to be businesses looking to utilize Twitter's networking and promotional capabilities.
Do you ever need to find resources for your classroom? By connecting to other educators through Social Networks such as Twitter, you have the power to tap into more than 6 MILLION educational resources right from your phone!
In this presentation, we walk through basic Twitter terminology and discuss why Twitter is a MUST for every educator.
A Girlfriend's Guide to Social Media: Alpha Kappa Alpha 2015 Leadership SeminarSmartChicks
This presentation was presented Maria Benson and LaTricia Woods at Alpha Kappa Alpha Sorority, Inc.'s 2015 Leadership Seminar. It is a crash course in social media for members of the organization - highlighting Social Media Dos and Don'ts from the "Girlfriend's" perspective.
Benson and Woods recently published A Girlfriend's Guide to Social Media and tailored the information to meet the needs of Alpha Kappa Alpha Sorority (they are both long time members).
The document provides an introduction to Twitter, including what it is, how to get started using it, and best practices. It discusses that Twitter is a microblogging tool where users post 140-character messages (tweets) and follow other users. It also outlines the four main types of tweets, how to set up an account, what to tweet about, bad habits to avoid, using links and photos, potential downsides of Twitter, and mobile apps to use. The goal is to help new users understand Twitter and get acclimated to using the platform.
The document provides instructions on how to create a Twitter account and engage on the platform. It recommends keeping your username short and without numbers or obscenities. It also notes that tweets are limited to 140 characters and that Twitter is meant for conversation by following others and making your own tweets. The document encourages following classmates and lists the different types of tweets like statements, mentions with @, direct messages, and retweets.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Más contenido relacionado
Similar a How to fail at twitter: Don't talk to strangers
This document provides an overview of Twitter, including its history and key metrics, common Twitter terminology like tweets, replies, retweets and favorites, etiquette for using hashtags and retweeting, and how to set goals and measure success for a Twitter account. It also reviews tools like TweetDeck that can help manage Twitter activities and increase influence, measured by Klout scores. The overall aim is to introduce readers to Twitter and help them get started effectively engaging on the platform.
Twitter is a communication platform where users can share short messages called tweets. The top three reasons people use Twitter are for learning, making connections, and crowd-sourcing information. To use Twitter, one signs up for an account, fills out their profile, follows others on topics of interest, searches for hashtags, and engages by liking, commenting on, and retweeting the tweets of others in their network.
Twitter for Teachers 101: Building Your PLN 140 Characters at a TimeMike Paul
Teachers are discovering that Twitter can be a great resource for professional learning and connecting with other educators. Learn some of the keys to using Twitter as a teacher and see the power of this incredible platform.
The document provides guidance on using Twitter, including:
- Tweets are limited to 140 characters, and can be posted via website or text message.
- Follow relevant people, events, and those your contacts follow to build your network.
- Engage with others by replying to or retweeting their posts, but be polite and on-topic in discussions.
- Hashtags, retweets, and shortened links can help others find and engage with your tweets.
This document provides background information on Twitter and discusses ways to use Twitter in higher education. It begins with quick facts about Twitter's founding in 2006 and current usage statistics. It then outlines 5 powerful ways to use Twitter in higher education according to an article by Dustin Brady: listen and reply to conversations, introduce real people on campus, participate in event backchannels, provide information updates, and use it for personal enrichment. Additional sections define common Twitter terms and features and suggest using HootSuite to schedule social media posts across multiple networks.
Twitter 101 - Building Your PLN 140 Characters at at TimeMike Paul
Learn why so many teachers are using Twitter for Professional Development with this introduction to Twitter. How to create an account, how to use hashtags & lists, and understanding the power of Twitter.
This document provides an introduction to using Twitter, including how to get started, what types of things to tweet about, and tips for making Twitter use easier. It discusses setting up an account, following others and getting followers, using hashtags and mentions, and tools like TweetDeck and Bitly that can help manage tweets. The document emphasizes observing proper etiquette, being careful about direct messages, and remembering that tweets are public statements.
This document provides an introduction to using Twitter. It defines common Twitter terminology like tweets, retweets, followers, hashtags, and direct messages. It explains how Twitter can be used to share thoughts, breaking news in real-time, and experiences from organized events. It provides tips for getting started on Twitter, including setting up a profile, finding people to follow, checking Twitter often, and tips for effective tweeting like keeping tweets concise and including relevant links and hashtags.
1. To build a good Twitter profile, focus on maintaining a good ratio of followers to people you follow and include a bio, photo, and location in your profile.
2. When tweeting, keep messages concise at 100-140 characters, share quality content like blog posts, and use hashtags sparingly to reach relevant audiences.
3. Engaging with others on Twitter through replies, retweets, and mentions is important for gaining followers over time, but the quality of content shared will ultimately determine whether people choose to follow your account.
Originally put this together for a consulting firm that was looking to engage in Twitter, but publishing it here when I heard the news that Ryanair are on Twitter.
A no nonsense presentation for those who want to learn how to start using Twitter. A brief explanation about what Twitter is, who uses Twitter, and how businesses are using it.
Simple slides illustrating how to tweet, reply, & privately message others on Twitter.
Also includes the easiest path to getting started by setting up your profile and finding interesting folks to follow.
The presentation ends with tips for better tweeting and simple ways to gain more followers.
Gary Moneysmith presented information on how to effectively use Twitter for business purposes. The presentation covered how to set up an account, find people to follow, engage in conversations, take photos, use hashtags and third-party applications, and tweet on behalf of a company. It emphasized staying on-brand and authentic, sharing useful information, and having multiple people manage a company account.
This document provides guidance on effective language use for social media. It begins by explaining key differences between the language of websites and social media. Social media language is more informal, conversational, and focused on readability within tight character limits. The document then offers best practices for constructing tweets, including using creative literary devices like alliteration and onomatopoeia. It encourages developing a unique voice and highlights dos and don'ts of social media language. Finally, it prompts practicing various creative tweet constructions to master social media communication.
This document summarizes a discussion at a Tech Club lunch about using Twitter. It explains what Twitter is, how to choose a username, Twitter basics like tweets and hashtags, how to access and sync Twitter, how to use it to find a job, and how to become a thought leader and get help on Twitter. The document provides guidance on making one's Twitter presence employeer-friendly when job searching and lists some Twitter accounts dedicated to job postings organized by company, field, and region.
The document provides an introduction to using Twitter for business purposes. It discusses setting up an account, following others, engaging in conversations, using hashtags and photos, cross-posting to other networks, and tools for easier management of a Twitter profile. The target audience appears to be businesses looking to utilize Twitter's networking and promotional capabilities.
Do you ever need to find resources for your classroom? By connecting to other educators through Social Networks such as Twitter, you have the power to tap into more than 6 MILLION educational resources right from your phone!
In this presentation, we walk through basic Twitter terminology and discuss why Twitter is a MUST for every educator.
A Girlfriend's Guide to Social Media: Alpha Kappa Alpha 2015 Leadership SeminarSmartChicks
This presentation was presented Maria Benson and LaTricia Woods at Alpha Kappa Alpha Sorority, Inc.'s 2015 Leadership Seminar. It is a crash course in social media for members of the organization - highlighting Social Media Dos and Don'ts from the "Girlfriend's" perspective.
Benson and Woods recently published A Girlfriend's Guide to Social Media and tailored the information to meet the needs of Alpha Kappa Alpha Sorority (they are both long time members).
The document provides an introduction to Twitter, including what it is, how to get started using it, and best practices. It discusses that Twitter is a microblogging tool where users post 140-character messages (tweets) and follow other users. It also outlines the four main types of tweets, how to set up an account, what to tweet about, bad habits to avoid, using links and photos, potential downsides of Twitter, and mobile apps to use. The goal is to help new users understand Twitter and get acclimated to using the platform.
The document provides instructions on how to create a Twitter account and engage on the platform. It recommends keeping your username short and without numbers or obscenities. It also notes that tweets are limited to 140 characters and that Twitter is meant for conversation by following others and making your own tweets. The document encourages following classmates and lists the different types of tweets like statements, mentions with @, direct messages, and retweets.
Similar a How to fail at twitter: Don't talk to strangers (20)
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
11. #Hash + tag ≠ a universal label,
but a personal tag or popular keyword.
Use Bit.ly.com = shorten & track clicks on links used
Economize your characters
16. Outro 3
Special thanks to
SPA-Baruch College
@KnowledgeCrush,
@randomdeanna,
@corvida, @lizmarley,
& @hakimsphotos.
Download each teleconference recording for $2.99
and RSVP for the next Facebook event at
facebook.com/kyraocity
Notas del editor
In life and in general, we do not listen. We sell, poke and prod, promote, argue, antagonize but we really and rarely don’t LISTEN.
I asked my mother the other day when she was visiting “Where did you get this (a facial product)?” She answered, “Oh, I use that to clean my face.” I said, “That’s the answer to what is this for. I asked ‘where did you get this?’.” We simply don’t listen.
Twitter is a unique not not readily intuitive and completely new listening mechanism unlike any before. It’s different than Facebook or LinkedIn but there are some important similarities you can ask me about another time.
Listening is dead or at least bankrupt.
I declare the old world of communication has long ended but we have not fully grasped its bankruptcy. We need to inspire new life, new ways of listening and that is what DON’T TALK TO STRANGERS is about. How perfect to share this around Halloween.
Ever notice that once something ends or dies, you still must make room for something new in its place? Whether it is a relationship, a business partner or even one’s childhood?
The process doesn’t just happen. It must be from creation, a creative act. Listening is not a creative act. Notice how old patterns are present in your listening not only of others but of yourself. The old will return in a new form with a vengeance if something new isn’t created. Creating something new requires play.
Welcome to HOW TO FAIL AT TWITTER: DON’T TALK TO STRANGERS. The recording of the October 30th call will be available for DOWNLOAD for $2.99 to anyone on the call or in the world.
CONFESSION: We (myself with KnowledgeCrush.com) had a poor set up for what was intended as a webinar. We started advertising late. And we were charging $39.99 for something people knew nothing about. When we had only 1 person registered two days before the call, so I decided to give the call away for FREE.
THE PARADOX OF 3:
Don’t be deceived when three people show up because there is still room for magic and that is exactly what happened. I was tempted to cancel the call even minutes into the call. One of the three people present was Christa of KnowledgeCrush. Three plus me = four.
But between the three of them and myself, we represented London and the U.S.A including Ann Arbor, Michigan and Harlem and Brooklyn, New York. Not bad for only three people! Our occupations represented web design, online business, transformation, anthropology, music, photography and architecture. Just three people! And the call was AMAZING!
RECORDING WILL BE AVAILABLE FOR DOWNLOAD ASAP FOR $2.99 TO ANYONE ON THE CALL OR IN THE WORLD
ADULTS & SOCIAL MEDIA
We made lemonade out of the lemons, as the old saying goes. We decided to build community first and make money a sign of that success. We are building a community of transformed adults as well as transformed social media folk. Even if you never use Twitter after this workshop, I promise you’ll be empowered to embrace our collective action and purpose on this planet. Drop your mask and join the humanizing revolution. TriksorTweets?
HERE’S MY INITIAL FACEBOOK INVITE:
Without touching a computer, staring at your crackberry or alarming your technophobic fears, this webinar will empower you and your organization thrive in a new way, not only in this depressed economic environment, but also in a way that has you sharing and listening for what lights you up.
MY BACKGROUND:
As one of the 140 Characters to speak at the first London #140Conf on Twitter last year, anthropologist and social media maven Kyra Gaunt shares how listening to strangers is a bit of a trick or treat for some but Twitter is a win-win for most. This is the workshop she gave to 140 strangers that was praised by the Manhattan Borough President's Office in July 2010. Part of the big whoop is finding our collective and our collective purpose in life. Or finding the compassion and caring for one another that makes a difference through strangers.
Many companies, NGOs, and government agencies like the Manhattan Borough President's Office are realizing the power of sharing. It's not simply about broadcasting your message, which IS important. Twitter is about a new way of thinking about doing business in a diverse world where strangers become our friends. ‘
THE RECORDING AVAILABLE FOR DOWNLOAD ASAP FOR $2.99 TO ANYONE ON THE CALL OR IN THE WORLD
的
“In the beginner's mind there are many possibilities, but in the expert's mind there are few.”
-- Shunryu Suzuki quotes (Japanese Zen priest)
Here I asked callers to share what they already knew or thought about Twitter or social media. Must unpack the old before creating the new.
Corvida Raven (@corvida) of SheGeeks.net, one of the leading women in tech, assisted me in delivering and implementing the original design of this workshop for the Manhattan Borough President’s Office 23 July 2010 at Baruch College-CUNY sponsored by the NonProfit Center at the School of Public Health. 170 people rsvped and 140 people attended and gave us rave reviews. And we never even touched the computers. So, what happened in that room? The power of generalized reciprocity, our earliest form of organization in humanity, showed up and we became each other’s resource.
Slides 7-11 are informational and though I rarely use them during this workshop, they are essential to how the workshop is experienced. The bulk of the interactions during the workshop is sharing; unpacking fears and emulating the experience or culture of Twitter in real-time without any computers. THIS IS THE GOLD OF MY FACILITATION - YOU UNPACK YOU!
BASICS OF TWITTER:
YOU GOTTA HAVE A HANDLE: Your Twitter name is called a “handle.” It must be 20 characters or less. It must be useful, simple to remember and reflect something about your identity--how you want to be known (more than a name). Don’t hide your identity or make the handle hard to find.
USING YOUR HANDLE ON TWITTER: Always include the @ prompt before using ANYONE’s handle. This allows the mention of their handle to show up on their profile page so they know you were chatting about them or responding to them.
HOW TO CHOOSE A HANDLE: My handle is @kyraocity and it is a portmanteau as well as one of my core values in life--Kyra-of-the-city explains the portmanteau and it is pronounced like the word “curiosity”. Your handle must be 20 characters or less. Samples:
@randomdeanna - may describe your diversity or your sense of yourself
@corvida - may be a name your created for yourself or a unusual name you don’t think will be duplicated
@meli_fluous or @nwjerseyliz - a characterization using your real name and/or place you live
@dailykos or @huffpo - the name of your business or a recognizable abbreviation
@dontbehated - a principle that reflects your character or mindset
@donnabrazile @billgates, @barackobama, @the_real_shaq, @SenGillibrand, @mharrisperry - a recognizable personality, star, or politician often uses their real name or real identity
DO YOU LIKE MY AVATAR:
An avatar is a computer user's representation of himself/herself or alter ego in a two-dimensional icon (picture) used on Internet forums and other communities[2][3]. It is an object representing the user. The term "avatar" can also refer to the personality connected with the screen name, or handle, of an Internet user.[5]
ABOUT MY AVATAR: Since my handle is @kyraocity the inclusion of my kitty cat Delilah seems perfect. Her full name is “Delilah do not touch!” That’s another story. Check out this cool playful YouTube video “Do You Want to Date my Avatar?” from the web series The Guild (Yes, I am a geek!) http://www.youtube.com/watch?v=urNyg1ftMIU.
Other avatars I use: I change my profile pic intermittingly. The one above is of Delilah, who has her own Twitter profile @cat_Delilah, sniffing over a protrait silhouette of my mother, which looks just like me. I have also used a photo of me in my PhD cap-and-gown when I am tweeting a lot about being a professor.
HISTORY OF AVATAR: This sense of the word “avatar” was coined by Neal Stephenson[6] in 1992 novel Snow Crash, who co-opted it from the Sanskrit word avatāra, which is a concept similar to that of incarnation. [Definitions from Wikipedia]
Some general things to get about the timeline or stream of tweets when you are on Twitter.com. There are other platforms to use to coordinate more than one social media platform at once such as Tweetdeck.com, HootSuite.com and others.
CHARACTER LIMITS:
You are limited to tweeting 140 characters or about 10-25 words. So others can easily retweet your tweet (show their network of followers that they like your voice, thoughts, comments), you should try to keep your tweets to 90-120 chracters (leaving about 20 for your handle which will identify you in any retweet). Part of your tweet may contain a link or url, so once again try to leave 12-15 characters for that.
OOPS! This is not a great fake tweet, since I went over the character limit. Let’s try again…next slide.
Much better! I stayed within the character limit by using abbreviations. I could have used these hashtags too -- #howto #hashtag. Doing that allows others searching Twitter to find this easily (intuitive key words). We want to be a resource to one another. Limits reinventing the wheel over and over again. Search for what your looking for in the search box on Twitter.com or on Google.
Also check out the various shorten links services like bit.ly and owl.ly and more via Google.These let you track how many people retweeted and clicked onto your links. You want to begin to learn what kind of influence you are leveraging by tweeting your thoughts, comments and business tweets.
ENGAGEMENT IS KEY
What keeps people from engaging is thinking they don’t have anything worthwhile to say or share. Bah-humbug!
You have everything you need to be an EXPERT or an ARTISAN on Twitter. Have the audacity to share exactly what’s is on your mind in a tweet. Be honest. Be daring. Be compassionate openly. Be vulnerable. Share the unspoken, the hidden and the unsaid. And don’t share anything you don’t want to share. You’re grown, now. You know what to do.
TRY SAYING SOMETHING NEW/DIFFERENT
Say the same thing, have the same life at work and home. Say something new (like that thing you’ve been dying to say in public at work, in the store, or at the family gathering, and watch life shift. Shift happens only when you say something new or different.
REAL-TIME DIALOGUE, REAL-TIME LISTENING
Twitter is about conversation in real-time. Dialogue and multi-logues. Short tweets facilitate real listening.
Storytelling is what people or tweeple on Twitter use to share bigger ideas or thoughts. Use your blog to tell longer stories than create a curious tweet to arouse interest. I call this Storytelling as soft-selling™.Tell stories about things that matter to you no matter how mundane.
I often re-tell a story of an elderly woman I met on an elevator. If I tweeted about it the tweet would read “Fruity day keeps the doctor away...” (see above and I had 34 characters remaining).
STORYTELLING:
Back in 2003 or 2004, I went to my first OB-GYN appointment in Manhattan. It was on the upper east side (boo!). I lived in the Village then. When I entered the building I noticed an decrepid elderly woman creeping towards the elevator. I pushed the button and when the elevator came I held the door for her.
I have been amazed how the elderly of NYC take the licking of old age but keep on ticking away through the streets to the corner store or, in the case, to the doctor’s by themselves. In the suburbs of Maryland where I am from, the elderly NEVER leave the house and definitely not unaccompanied.
We got on the elevator and I was in an amazing mood just admiring her fortitude, chipping on her merry way. I said “Good morning! How are you, today!!?”
She said, “I’ve had a headache since August 27th.” I was stunned, speechless. It was mid-November. She added, “I got runned over by an apple cart.”
Stunned again, I surprised myself when my devilish humor compelled me to say, “So you’re feeling FRUITY today?” And she got tickled. She went from looking miserable to chuckling. She said, “Yea, I guess I am.”
When people say that sharing something like what I had for breakfast is what makes up Twitter they are missing the point. Sharing the mundane, the little moments like makes you cry or laugh, that you see our extra-ordinariness in the ordinary moments of life…well tweeting is the perfect insertion of these moments of life into our everyday-ness. Or at least, I think so.
STORYTELLING AS SOFT-SELLING™
What I am selling with this story is the POWER of sharing and connecting in curious ways. People on Twitter are interested in your core values and connecting with you. If they like your values, they’ll do all kinds of business with you including collaborate, assist, and yes buy or support your products and services. But connection comes first.
S.T.O.P. Listening
So if you don’t want to play that game, STOP Listening! Or don’t share. Don’t be transparent. Don’t be open and definitely DO NOT PLAY with strangers!!
TWIKS or TWEETS?
On the call we discovered that certain lingo or jargon from Twitter is probably what is triggering the scary stuff for people concerned about privacy and trust in talking to strangers. Being followed by followers who are strangers (Boo!!). On Facebook, you have friends.
If you are harboring that old childhood mentality of “Don’t Talk to Strangers” all these followers seem menacing and a cause for alarm. Who’s going to protect you without mommy and daddy or your friends? Perhaps being an adult means upgrading that unwritten rule from childhood. We are not kids anymore!
TIME TO UPGRADE:
Talking to strangers is the only way to expand your business. To expand your network. To change your life, I assert. When you were a kid, you couldn’t even yell for help you were taught to trust adults to a fault. “Do what I say, not what I do!”
I was lucky to capture the screen shot above of my twitter timeline. The first tweet listed at the top is from Ralph Marston--one of his daily affirmations. “Where there is no fear there is pure abundance.” That is what I want to leave you with from this workshop! Have no fear, Twitter is here to save the day in ways that require learning the unwritten rules that stop us from playing and the unwritten rules of sharing, transparency, openness, and play.
Screen shot was taken on October 31, 2010 round 9amEST on Halloween (Bwa-ah-ah-ahhhh!). The inset image on the left of Dr. Horrible (of Dr. Horrible’s Sing-A-Long-Blog) singing in the rain is from http://yirmumah.com/webcomic/draw-anything-072.gif.
If you haven’t seen Dr. Horrible’s Sing-A-Long-Blog, YouTube it!! Best for the corny, geeky camp of grown-ups.
And that’s an overview and some key insights into HOW TO FAIL AT TWITTER: DON’T TALK TO STRANGERS & STOP Listening as an adult.
I hope you can now notice the paradigm shift in communication that Twitter reflects. Whether you actually use the Twitter platform or not, there is something to get about sharing collectively and collaboratively that is missing from our society but emerging (think the Obama campaign!). Obama has been on Twitter since early 2007, tweeting as himself. Pretty amazing use of social media.
I assert that Twitter is one key tool that is restoring us to our earliest and longest form of social interaction from the hunter-gatherer adaptive strategy I teach in my intro to cultural anthropology courses. For over 2 millennia we lived in small groups of 30-100 and there was no ownership or even a need to say thank you. Since nothing belonged to anyone, that social construct hadn’t been conceived of, and there was no sense of “leadership,” people used their influence and role modeling to make things happen, it would have been an insult to keep track of what someone did or didn’t do for you or take from you.
Twitter is about doing for others not taking. Providing what people need, not selling. This is a sharer’s or sharing market, not a seller’s market.
Twitter is a tool to letting go of those things that make work suck and saying those things that would make a difference. It’s about finding your tribe, those people on the same frequency as you.
We cannot do this if we never let go of the past (like Don’t Talk to Strangers and the hidden assumptions we carry as kids into adulthood).
I am facilitating a conversation about Twitter to transform the discourse of childhood that makes Twitter seem so scary and it’s time to put that to rest. We are grown folks, not kids.
I would love to have you join this community on these calls to practice becoming a master at a new kind of listening with the skills Twitter promotes.
Visit my Facebook invites for more at http://facebook.com/kyraocity.
Remember, if you want to fail at Twitter, Don’t Talk to Strangers.
Thanks for folks who helped me see I was an expert in all this and thanks to Twitter.